Static task
static1
Behavioral task
behavioral1
Sample
b14107c99599cac9811eec39e0540a211165ad725f24136c1f4f6267a0438f3c.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b14107c99599cac9811eec39e0540a211165ad725f24136c1f4f6267a0438f3c.dll
Resource
win10v2004-20221111-en
General
-
Target
b14107c99599cac9811eec39e0540a211165ad725f24136c1f4f6267a0438f3c
-
Size
37KB
-
MD5
21b9e3b0cce5bbca0c8ba6c115fbf86a
-
SHA1
b2376f3299e8bb2b0295379a0a098f18686c7a85
-
SHA256
b14107c99599cac9811eec39e0540a211165ad725f24136c1f4f6267a0438f3c
-
SHA512
d4ce6dd1e4763b2a68900ca71fb4cc298382d287c6076aa88cdc7151282268b9e08cd42f8503a1486d9b43055ea9f0a2ae92bf1d590f146db70f863a5f7cab41
-
SSDEEP
768:gx9SiAdOrF52ie5qFBzVNYu60+vQite/u5cQnebIw4R:oHAduFc1gBZOu60kQiUWBebR4R
Malware Config
Signatures
Files
-
b14107c99599cac9811eec39e0540a211165ad725f24136c1f4f6267a0438f3c.dll windows x86
b8637b6c312fdb41d9c60d9197a15bd4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExAllocatePool
RtlTimeToTimeFields
DbgPrintReturnControlC
memcpy
Ke386QueryIoAccessMap
RtlInitializeRangeList
RtlImageNtHeader
CcMdlReadComplete
ZwWaitForMultipleObjects
FsRtlIsHpfsDbcsLegal
hal
KeFlushWriteBuffer
KeReleaseSpinLock
HalBeginSystemInterrupt
IoAssignDriveLetters
KdComPortInUse
IoReadPartitionTable
HalQueryDisplayParameters
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 562B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ