Static task
static1
Behavioral task
behavioral1
Sample
590eed02670466ab495b3cafa773f3d70df8469307063c3611c775d17739ac84.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
590eed02670466ab495b3cafa773f3d70df8469307063c3611c775d17739ac84.dll
Resource
win10v2004-20220812-en
General
-
Target
590eed02670466ab495b3cafa773f3d70df8469307063c3611c775d17739ac84
-
Size
48KB
-
MD5
9035f48f1520fc8d654a9c1a7f2835c0
-
SHA1
e17b2f34f7264a4e7c60eedc72987e8becf122fa
-
SHA256
590eed02670466ab495b3cafa773f3d70df8469307063c3611c775d17739ac84
-
SHA512
41af5b32b4b866311064c419001e6f9df74e66b03f23c2738b15f929584569f303ee3ee83533d6ed77649e1d4c98630bd65c3a0d89eef6de8158440561fe3d4e
-
SSDEEP
768:ufXBqj0wRk+Xev1p1e8RpAjzUJwpvtEtrDYOcYB2rLAOI0sZZjD4n+iEq:CVwRk+X6a8zAfNtEtrDmMD9ZynBE
Malware Config
Signatures
Files
-
590eed02670466ab495b3cafa773f3d70df8469307063c3611c775d17739ac84.dll windows x86
3bcde647fdcac5e5c160627ef17d69cb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlEqualString
RtlFindNextForwardRunClear
RtlEqualUnicodeString
IoReportResourceForDetection
MmGetSystemRoutineAddress
RtlValidSecurityDescriptor
IoGetRelatedDeviceObject
IoDetachDevice
MmSizeOfMdl
RtlGUIDFromString
RtlCompareString
ZwMakeTemporaryObject
RtlCharToInteger
KeClearEvent
RtlInitUnicodeString
SeAssignSecurity
RtlIntegerToUnicodeString
RtlInitString
KeInitializeTimerEx
strncpy
KeCancelTimer
IoDeleteSymbolicLink
Sections
.text Size: 25KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ