Static task
static1
Behavioral task
behavioral1
Sample
343ea64e1a6e01dc2f8ed706f3d77e627abce19ab9660f82b447b5f80527fb18.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
343ea64e1a6e01dc2f8ed706f3d77e627abce19ab9660f82b447b5f80527fb18.dll
Resource
win10v2004-20220812-en
General
-
Target
343ea64e1a6e01dc2f8ed706f3d77e627abce19ab9660f82b447b5f80527fb18
-
Size
60KB
-
MD5
ad923bb061a8795999a8d245dcda259d
-
SHA1
512f9fb0c3b5626ded98b174b08541dec3856cd7
-
SHA256
343ea64e1a6e01dc2f8ed706f3d77e627abce19ab9660f82b447b5f80527fb18
-
SHA512
3746a6916982fc404f16127a4aa7bb306502b75002490c04c8a35fcd1a2dd18372f2aca0a8894f6ec7cba40606ee196c0a63619d1e06b1e9d443fa9f85358106
-
SSDEEP
768:k9htYuxxMz4m/0+m45dC66lsgrgipeaddlrTpEMaqZFI6rF2zRb1sueIxz9IsSnH:yVSzqiAls+gi0wvphy8F2zRb1suL9cH
Malware Config
Signatures
Files
-
343ea64e1a6e01dc2f8ed706f3d77e627abce19ab9660f82b447b5f80527fb18.dll windows x86
65bb2bf013e2a1448c9d69194be70193
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
hal
KeQueryPerformanceCounter
ntoskrnl.exe
KeGetCurrentThread
KeInitializeTimer
MmQuerySystemSize
memcpy
memset
PsGetCurrentProcessId
IoGetCurrentProcess
KeTickCount
KeInitializeMutex
PsGetCurrentThreadId
KeQueryActiveProcessors
KeInitializeSpinLock
PsGetVersion
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 633B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 426B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 896B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ