Static task
static1
Behavioral task
behavioral1
Sample
f1325f191243647270290900346c658eea0f4d36c95a8b159fae76bfc5b5ffec.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f1325f191243647270290900346c658eea0f4d36c95a8b159fae76bfc5b5ffec.dll
Resource
win10v2004-20220812-en
General
-
Target
f1325f191243647270290900346c658eea0f4d36c95a8b159fae76bfc5b5ffec
-
Size
61KB
-
MD5
00c7ae6e1a06c8267aa89362bc739052
-
SHA1
6887974e65aec43f7cc2834f1f882102caf5cdd7
-
SHA256
f1325f191243647270290900346c658eea0f4d36c95a8b159fae76bfc5b5ffec
-
SHA512
c177f52e1b450a7b03fff8f47a471f3d867a9e6c3e1c35ed5e4f1f4b43e521a9b4128766cf5eb8d8158bfa854d240f6dbbdf6933719a91a39fb818074c3c4a32
-
SSDEEP
1536:AZjhUiwFQN/3AXBxaz85oInshDwzYVmcsdR:iUi0iHUodZYYVmcsdR
Malware Config
Signatures
Files
-
f1325f191243647270290900346c658eea0f4d36c95a8b159fae76bfc5b5ffec.dll windows x86
ca8b0375eb24dc2c73d7fd9c28c4e4c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlSetAllBits
KeBugCheckEx
RtlDeleteRegistryValue
MmCanFileBeTruncated
RtlCreateUnicodeString
KeDelayExecutionThread
SeImpersonateClientEx
RtlInitUnicodeString
RtlAnsiCharToUnicodeChar
SeSinglePrivilegeCheck
MmLockPagableSectionByHandle
RtlTimeToSecondsSince1980
RtlEqualUnicodeString
RtlUpperChar
MmIsDriverVerifying
MmPageEntireDriver
PoSetPowerState
MmHighestUserAddress
FsRtlCheckLockForWriteAccess
IoGetRelatedDeviceObject
RtlInitString
IoCheckQuotaBufferValidity
RtlEqualString
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ