Static task
static1
Behavioral task
behavioral1
Sample
fe766c80c4547b3df62faedefecf1e66af02f9de55069958d9e74cfbecf12c30.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe766c80c4547b3df62faedefecf1e66af02f9de55069958d9e74cfbecf12c30.dll
Resource
win10v2004-20221111-en
General
-
Target
fe766c80c4547b3df62faedefecf1e66af02f9de55069958d9e74cfbecf12c30
-
Size
69KB
-
MD5
112c83cd320ef71f01fd85a5c8eabb6b
-
SHA1
0b7d21c201fc896c756f508f276f514ef8154caa
-
SHA256
fe766c80c4547b3df62faedefecf1e66af02f9de55069958d9e74cfbecf12c30
-
SHA512
d887f4efabbe324138f7a1b605b7fa11d70d8c1ae4183eea656b9966d879acc6e5a8a1a069cf2f2ba6787f87bf40b86dab8761cd0342ad0bbbd107ed2c8cdf11
-
SSDEEP
1536:/eE/pjUPpGlKtYyKaJp1CSvVc2eVUzD3Y+IkoytTp1:/eQNUPGJajoSvV/KQD3Y+Ig
Malware Config
Signatures
Files
-
fe766c80c4547b3df62faedefecf1e66af02f9de55069958d9e74cfbecf12c30.dll windows x86
516b75b07769e5ec762087b2c5f86610
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
NtReadFile
KeQueryActiveProcessors
PsSetLegoNotifyRoutine
SePrivilegeCheck
RtlStringFromGUID
RtlAddRange
ExIsResourceAcquiredExclusiveLite
Sections
.data Size: - Virtual size: 76KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 238B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ