Static task
static1
Behavioral task
behavioral1
Sample
d5dea94492040d613aa1456751e67961f20c76e755869092909fca476e74e0a2.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d5dea94492040d613aa1456751e67961f20c76e755869092909fca476e74e0a2.dll
Resource
win10v2004-20220812-en
General
-
Target
d5dea94492040d613aa1456751e67961f20c76e755869092909fca476e74e0a2
-
Size
73KB
-
MD5
cbbe5471aafcae14e3714f7e87d15ba2
-
SHA1
2c8b6f519229127abb62e4c34324efcdf9b65ed8
-
SHA256
d5dea94492040d613aa1456751e67961f20c76e755869092909fca476e74e0a2
-
SHA512
4441cc2d245c100f6b25dbe55921b94d5d81afd72cef8c8a48f673a0ba8b7ca17465e2cd8ef67d634d7b13969cbbf36f5f15c76c1f26384f1a0871b095d0c373
-
SSDEEP
768:OpT09hy1/CznXZh2YwitFBMVQweM8n33l8Q2RZZ9CF6H75mp19ltfu4KnMXfUOzh:Old4qviMkMAaQ89IEw9duRMsq6nm
Malware Config
Signatures
Files
-
d5dea94492040d613aa1456751e67961f20c76e755869092909fca476e74e0a2.dll windows x86
0462971f0dd42a5dd9e669bf129932ab
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoQueryFileInformation
ExInitializeResourceLite
ExDeleteResourceLite
KeInitializeEvent
KeEnterCriticalRegion
ExAcquireFastMutexUnsafe
ExReleaseFastMutexUnsafe
KeLeaveCriticalRegion
ExAllocatePool
ExFreePoolWithTag
RtlInsertElementGenericTableAvl
RtlDeleteElementGenericTableAvl
RtlInitializeGenericTableAvl
NtOpenFile
NtQueryVolumeInformationFile
NtClose
swprintf
RtlInitUnicodeString
ObReferenceObjectByHandle
IoGetRelatedDeviceObject
ExAcquireResourceExclusiveLite
ExReleaseResourceLite
ExAcquireResourceSharedLite
ZwCreateFile
IoGetStackLimits
MmFlushImageSection
CcInitializeCacheMap
CcPurgeCacheSection
CcSetFileSizes
ZwClose
MmMapLockedPagesSpecifyCache
CcFlushCache
CcUninitializeCacheMap
IofCallDriver
IofCompleteRequest
IoSetInformation
CcCopyWrite
FsRtlCopyRead
IoCreateDevice
ZwAllocateVirtualMemory
memcpy
RtlEqualUnicodeString
ZwOpenThread
ZwQueryInformationThread
ZwQuerySystemInformation
memset
KeInitializeApc
ObfReferenceObject
KeInsertQueueApc
KeDelayExecutionThread
PsCreateSystemThread
ZwOpenKey
ZwSetValueKey
strcpy
ZwOpenFile
ZwQueryObject
ZwQueryInformationFile
ZwDeviceIoControlFile
wcslen
ZwCreateSymbolicLinkObject
ZwCreateDirectoryObject
ZwWriteFile
ZwCreateSection
IoGetCurrentProcess
PsLookupProcessByProcessId
ZwOpenSection
ZwMapViewOfSection
MmAllocatePagesForMdl
MmUnmapLockedPages
MmFreePagesFromMdl
ZwUnmapViewOfSection
RtlHashUnicodeString
ZwReadFile
ExAllocatePoolWithTag
PoStartNextPowerIrp
PoCallDriver
ZwFlushVirtualMemory
ZwEnumerateKey
ZwDeleteKey
ZwQueryKey
ZwSetSystemInformation
IoCreateDriver
ObMakeTemporaryObject
ZwDeleteFile
ObReferenceObjectByName
IoDriverObjectType
IoEnumerateDeviceObjectList
wcsrchr
ZwQueryVolumeInformationFile
ZwQueryValueKey
PsLookupProcessThreadByCid
ObfDereferenceObject
hal
KfLowerIrql
KeGetCurrentIrql
KfRaiseIrql
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ