Static task
static1
Behavioral task
behavioral1
Sample
07af5c96d71304b63c3f22269a6e86e239eab33ebf46089bcdb8f46f180265a8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
07af5c96d71304b63c3f22269a6e86e239eab33ebf46089bcdb8f46f180265a8.dll
Resource
win10v2004-20220901-en
General
-
Target
07af5c96d71304b63c3f22269a6e86e239eab33ebf46089bcdb8f46f180265a8
-
Size
445KB
-
MD5
096c47ed8c3e36d551b6588b4fe923a4
-
SHA1
13209216e400c073ba8498fd5805a3774a2ee6a3
-
SHA256
07af5c96d71304b63c3f22269a6e86e239eab33ebf46089bcdb8f46f180265a8
-
SHA512
9a38da4ddddff64384f379b269ce27e843edd58e70afc88312ed4698af1cc74249fe037f9dec5a5342830347e7930ba0ec2b6878aa8164180beaee510073fa2b
-
SSDEEP
12288:LC1ab/BtKy4LE4wxubJ2Li73ZpjgRdKWQ:LpiW/MbJ2LO3ZpkRIx
Malware Config
Signatures
Files
-
07af5c96d71304b63c3f22269a6e86e239eab33ebf46089bcdb8f46f180265a8.dll windows x86
dca231a9b53e3522426a43001733f2f5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlUpcaseUnicodeString
KeResetEvent
CcCopyRead
RtlUnicodeToMultiByteN
RtlEqualString
KeSetTargetProcessorDpc
RtlCompareString
RtlInitUnicodeString
CcFastCopyWrite
MmMapLockedPagesSpecifyCache
IoCreateDevice
ExGetPreviousMode
RtlIntegerToUnicodeString
KeSynchronizeExecution
KeInitializeTimerEx
KeUnstackDetachProcess
ExLocalTimeToSystemTime
RtlAnsiCharToUnicodeChar
KeInitializeDpc
RtlCharToInteger
IoGetDriverObjectExtension
RtlInitString
RtlEqualUnicodeString
KeCancelTimer
SeImpersonateClientEx
strncpy
Sections
.text Size: 25KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 748B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ