Static task
static1
Behavioral task
behavioral1
Sample
abee264073aa49e62ba8983804134009f874f1079b2fb4721046ead8dc9363ba.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abee264073aa49e62ba8983804134009f874f1079b2fb4721046ead8dc9363ba.dll
Resource
win10v2004-20220901-en
General
-
Target
abee264073aa49e62ba8983804134009f874f1079b2fb4721046ead8dc9363ba
-
Size
60KB
-
MD5
b787fbc8ce368ec764443072e981e66d
-
SHA1
882f9ff531822b60ae51b185ed89eb7059876086
-
SHA256
abee264073aa49e62ba8983804134009f874f1079b2fb4721046ead8dc9363ba
-
SHA512
5344dcd6c246d0f2d080b9442e392b9e962674c55c5fd21e6d7a955f85659abe8760407e85ad47bb117b4a208f0de0841de8fc797ea8889f99d8dd2da5e78e28
-
SSDEEP
768:e9htYuxxMz4m/0+m45dC66lsgrgipeaddlrTpEMaqZFI6rF2zRb1sueIxz9IsSnH:kVSzqiAls+gi0wvphy8F2zRb1suL9cH
Malware Config
Signatures
Files
-
abee264073aa49e62ba8983804134009f874f1079b2fb4721046ead8dc9363ba.dll windows x86
65bb2bf013e2a1448c9d69194be70193
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
hal
KeQueryPerformanceCounter
ntoskrnl.exe
KeGetCurrentThread
KeInitializeTimer
MmQuerySystemSize
memcpy
memset
PsGetCurrentProcessId
IoGetCurrentProcess
KeTickCount
KeInitializeMutex
PsGetCurrentThreadId
KeQueryActiveProcessors
KeInitializeSpinLock
PsGetVersion
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 633B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 426B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 896B - Virtual size: 872B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ