Static task
static1
Behavioral task
behavioral1
Sample
eb4ad0624a9fb15aa5cef38e34979c037fc36a443f59cf6d854acf23145e7ee0.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb4ad0624a9fb15aa5cef38e34979c037fc36a443f59cf6d854acf23145e7ee0.dll
Resource
win10v2004-20221111-en
General
-
Target
eb4ad0624a9fb15aa5cef38e34979c037fc36a443f59cf6d854acf23145e7ee0
-
Size
60KB
-
MD5
e3bdd32a0418397bb591dd1167e4027d
-
SHA1
e52d241a3f1f7ab4b9bf5bf7a0b09dff2801ba5a
-
SHA256
eb4ad0624a9fb15aa5cef38e34979c037fc36a443f59cf6d854acf23145e7ee0
-
SHA512
650a4037c687d96f92025237416673050dd46f00ba600bce9b6a0916e409cbe1a95bff781ba28a5dd92ae338edace40b3e90f97a90b119f7ceb13905138ac8e9
-
SSDEEP
768:A9htYuxxMz4m/0+m45dC66lsgrgipeaddlrTpEMaqZFI6rF2zRb1sueIxz9IsSnH:+VSzqiAls+gi0wvphy8F2zRb1suL9cH
Malware Config
Signatures
Files
-
eb4ad0624a9fb15aa5cef38e34979c037fc36a443f59cf6d854acf23145e7ee0.dll windows x86
65bb2bf013e2a1448c9d69194be70193
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
hal
KeQueryPerformanceCounter
ntoskrnl.exe
KeGetCurrentThread
KeInitializeTimer
MmQuerySystemSize
memcpy
memset
PsGetCurrentProcessId
IoGetCurrentProcess
KeTickCount
KeInitializeMutex
PsGetCurrentThreadId
KeQueryActiveProcessors
KeInitializeSpinLock
PsGetVersion
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 633B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 426B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 896B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ