Static task
static1
Behavioral task
behavioral1
Sample
dfab89c3db35e8c718f73579648ba2c7c8cad3fe24a1a359b54744c1839277d8.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfab89c3db35e8c718f73579648ba2c7c8cad3fe24a1a359b54744c1839277d8.dll
Resource
win10v2004-20220901-en
General
-
Target
dfab89c3db35e8c718f73579648ba2c7c8cad3fe24a1a359b54744c1839277d8
-
Size
6KB
-
MD5
2c247d7bd285798f2aa65b16c5adabfb
-
SHA1
e3d06dc7e8e77c0fd218c998298af3b397ea394c
-
SHA256
dfab89c3db35e8c718f73579648ba2c7c8cad3fe24a1a359b54744c1839277d8
-
SHA512
bfc04e8412b0a89b936c01a281dc94f806d77beadbf28df9f6f1fcca2a361d6d7e7b69b53a5cb7830b9d261819939c262ef235634d6a900dc4d3832ac2e6c428
-
SSDEEP
96:K7rXc+zKQyHQv30kFPKJK1nSDidp1LSjyOYjJKFaTPZcySwcApxppVSz:K79zf+QjMKRSiFLSe/js6+lCxH
Malware Config
Signatures
Files
-
dfab89c3db35e8c718f73579648ba2c7c8cad3fe24a1a359b54744c1839277d8.dll windows x86
e610606a11a87777a4b7b6452a47757a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
PsCreateSystemThread
RtlDeleteRegistryValue
RtlWriteRegistryValue
RtlCreateRegistryKey
ZwWriteFile
ExFreePoolWithTag
ZwReadFile
ExAllocatePoolWithTag
ZwQueryInformationFile
ZwCreateFile
RtlRandom
RtlCopyUnicodeString
RtlAppendUnicodeToString
RtlGetVersion
PsTerminateSystemThread
ZwLoadDriver
RtlAppendUnicodeStringToString
RtlQueryRegistryValues
KeDelayExecutionThread
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 213B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 128B - Virtual size: 50B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 640B - Virtual size: 568B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ