Static task
static1
Behavioral task
behavioral1
Sample
1619e078e4dbcd5f7a1cbb498e9669ec071a3881af5dcdc05b077843dc785cae.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1619e078e4dbcd5f7a1cbb498e9669ec071a3881af5dcdc05b077843dc785cae.dll
Resource
win10v2004-20220901-en
General
-
Target
1619e078e4dbcd5f7a1cbb498e9669ec071a3881af5dcdc05b077843dc785cae
-
Size
135KB
-
MD5
0afee6768d3d04e2b85475e29058a926
-
SHA1
7553a4251ad26fc5bb472458088ca98635f6b065
-
SHA256
1619e078e4dbcd5f7a1cbb498e9669ec071a3881af5dcdc05b077843dc785cae
-
SHA512
a9d190b6d399a4887cb4b1b53d3d69f0c1efa8d3e1dcd0439336c5be6f7a1bb3f5026f481a5acde2be8823d4f1e75c6d2bd461a94f93688851c155e02bd43e79
-
SSDEEP
3072:rIrqo5HYdCoP/iCWU7ZEAi0Gv7YHZE76VuLFUSfSEp:rkHYhnbWU7Zpi5YHaVLa7
Malware Config
Signatures
Files
-
1619e078e4dbcd5f7a1cbb498e9669ec071a3881af5dcdc05b077843dc785cae.dll windows x86
da6223e53d4e62b4798118ec2342029b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeLeaveCriticalRegion
KeRestoreFloatingPointState
KeUnstackDetachProcess
RtlEqualString
FsRtlCheckLockForWriteAccess
RtlInitializeUnicodePrefix
IoDeviceObjectType
ExNotifyCallback
RtlInitUnicodeString
IoCreateDevice
RtlEqualUnicodeString
IoOpenDeviceRegistryKey
ExReleaseFastMutexUnsafe
RtlDeleteNoSplay
IoCheckShareAccess
RtlUpperChar
ExUnregisterCallback
PsGetCurrentThread
ZwDeleteKey
RtlInitString
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ