Static task
static1
Behavioral task
behavioral1
Sample
a0111cd76ae1d599fb745d2001c16968c96b34cd69a90c53bac64231ff370081.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a0111cd76ae1d599fb745d2001c16968c96b34cd69a90c53bac64231ff370081.dll
Resource
win10v2004-20221111-en
General
-
Target
a0111cd76ae1d599fb745d2001c16968c96b34cd69a90c53bac64231ff370081
-
Size
106KB
-
MD5
92218cbf8a8fab03406854a87a318260
-
SHA1
c067fad347c83e884115ec05e51e91b4d1115aa0
-
SHA256
a0111cd76ae1d599fb745d2001c16968c96b34cd69a90c53bac64231ff370081
-
SHA512
d33c4a82bce42df984d0506be39a9bfc5d544c0aaa4d47d27f93d8ac629b7285640f10c8444605271a2ca8ea217fcb2f8fbc503cd68b67e0263c8bf86c930fbf
-
SSDEEP
3072:ol/9WESza0sXyxDkdgaKjJkNcbzCIVnijEN:ol/9+azixDkdNcJzCEim
Malware Config
Signatures
Files
-
a0111cd76ae1d599fb745d2001c16968c96b34cd69a90c53bac64231ff370081.dll windows x86
f6c3625e3bfd7b7098f9fc1baac4d186
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlCreateUnicodeString
RtlValidSecurityDescriptor
IoReportDetectedDevice
MmSetAddressRangeModified
IoGetAttachedDeviceReference
RtlAreBitsSet
ZwMapViewOfSection
IoDeleteSymbolicLink
RtlVerifyVersionInfo
PsIsThreadTerminating
RtlInitUnicodeString
ExDeleteResourceLite
FsRtlIsDbcsInExpression
KeInitializeDeviceQueue
CcDeferWrite
RtlEqualString
FsRtlIsFatDbcsLegal
IoCreateFile
RtlUpperChar
RtlInitString
PoSetPowerState
RtlEqualUnicodeString
FsRtlCheckOplock
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ