Static task
static1
Behavioral task
behavioral1
Sample
f4b3a148caf60aafe8c1d610c1aad1e959cfb29cce9baed96a7f05be5193bb02.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f4b3a148caf60aafe8c1d610c1aad1e959cfb29cce9baed96a7f05be5193bb02.dll
Resource
win10v2004-20220901-en
General
-
Target
f4b3a148caf60aafe8c1d610c1aad1e959cfb29cce9baed96a7f05be5193bb02
-
Size
48KB
-
MD5
807f366b239310b2e3c7ae963618150c
-
SHA1
8cd12009c7614429a67704b549c5e4a02c7fb3cb
-
SHA256
f4b3a148caf60aafe8c1d610c1aad1e959cfb29cce9baed96a7f05be5193bb02
-
SHA512
f4904b42102d87dadfedecf593c358764773e28d439a1be45e177538a90f027905a76763f1fb99c5449b7ff747bd5113d8c42779d519f86c259f2cb6d557c4c0
-
SSDEEP
768:uiQFS+s3mR02LhUHzEYDRIwH5bWo9Z+AcCZXTA21cfctdSIihmDpefPwvLJZMt8u:usk0ch24Y+Do9Z+AcCBdVWgut8+P7
Malware Config
Signatures
Files
-
f4b3a148caf60aafe8c1d610c1aad1e959cfb29cce9baed96a7f05be5193bb02.dll windows x86
ca761646cd082ff862f41fc205fa03af
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExNotifyCallback
KeEnterCriticalRegion
PsTerminateSystemThread
RtlInitializeUnicodePrefix
ExRaiseAccessViolation
ZwMapViewOfSection
RtlInitString
RtlInitUnicodeString
FsRtlIsDbcsInExpression
RtlEqualUnicodeString
KeInitializeTimerEx
IoSetSystemPartition
ZwFreeVirtualMemory
RtlCharToInteger
RtlIntegerToUnicodeString
KeBugCheck
FsRtlIsFatDbcsLegal
SeAssignSecurity
strncpy
ZwCreateFile
RtlSubAuthoritySid
RtlEqualString
IoSetShareAccess
ObCreateObject
ZwFsControlFile
PoRequestPowerIrp
RtlCompareString
KeInitializeQueue
KeCancelTimer
Sections
.text Size: 23KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ