Static task
static1
Behavioral task
behavioral1
Sample
26e212653a106e17d4a69a9e69dc190d8da7c4139b63cb2d16541cf5a3df7ab0.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
26e212653a106e17d4a69a9e69dc190d8da7c4139b63cb2d16541cf5a3df7ab0.dll
Resource
win10v2004-20231020-en
General
-
Target
26e212653a106e17d4a69a9e69dc190d8da7c4139b63cb2d16541cf5a3df7ab0
-
Size
77KB
-
MD5
3fbaeb61dbfe893f5466f58047a54e93
-
SHA1
b20b015ff9157a8f21a5c046dde3de9a27a06dc9
-
SHA256
26e212653a106e17d4a69a9e69dc190d8da7c4139b63cb2d16541cf5a3df7ab0
-
SHA512
87f39eb380f9d66e7580aab1667eab44555c1bc152bb26c174c6c7bbd299e64cc4301caa5ffe99c58249cc37ea3357b611f539daf20440f4d9372d6b3f86549e
-
SSDEEP
1536:aQgLLNDuDed9yFNuv705VavTXC9Hg/by3U19dJ:aQGWed9yyv7AavbC9KddJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26e212653a106e17d4a69a9e69dc190d8da7c4139b63cb2d16541cf5a3df7ab0
Files
-
26e212653a106e17d4a69a9e69dc190d8da7c4139b63cb2d16541cf5a3df7ab0.dll windows:5 windows x64
f282a49029e1552e7c61d0f09b88a3fe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
ntoskrnl.exe
KeSetEvent
KeBugCheckEx
IoFreeIrp
KeClearEvent
KeWaitForSingleObject
IoAllocateIrp
IoGetRelatedDeviceObject
KeInitializeEvent
ZwClose
SeCreateAccessState
IoGetFileObjectGenericMapping
ObCreateObject
ObfDereferenceObject
ObReferenceObjectByHandle
IoFileObjectType
IoCreateFile
RtlInitUnicodeString
IofCallDriver
NtClose
IoReuseIrp
ZwReadFile
ZwQueryInformationFile
ZwCreateFile
RtlAppendUnicodeToString
RtlCompareMemory
ZwSetInformationFile
ZwWriteFile
ObfReferenceObject
ExAllocatePoolWithTag
ZwDeleteFile
wcscat
wcscpy
wcslen
ZwQueryDirectoryFile
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQueryTimeIncrement
ZwDeleteKey
ZwOpenKey
RtlAppendUnicodeStringToString
RtlCopyUnicodeString
ZwEnumerateKey
ZwQueryKey
ZwSetValueKey
RtlAnsiStringToUnicodeString
ExAllocatePool
ZwQueryValueKey
__C_specific_handler
atoi
strstr
_vsnprintf
IoBuildDeviceIoControlRequest
IoGetLowerDeviceObject
MmUnlockPages
MmProbeAndLockPages
IoAllocateMdl
IoFreeMdl
MmIsAddressValid
PsGetVersion
MmGetSystemRoutineAddress
rand
srand
CmUnRegisterCallback
CmRegisterCallback
RtlCompareUnicodeString
ZwCreateKey
RtlQueryRegistryValues
MmSystemRangeStart
_itoa_s
PsCreateSystemThread
IoCreateSymbolicLink
RtlUnicodeStringToAnsiString
_vsnwprintf
IoCreateDevice
IoAttachDeviceToDeviceStack
IoGetDeviceObjectPointer
IofCompleteRequest
KeDelayExecutionThread
ObQueryNameString
RtlFreeAnsiString
ZwQueryObject
ZwDuplicateObject
ZwOpenProcess
ZwQuerySystemInformation
KeUnstackDetachProcess
ObSetHandleAttributes
PsInitialSystemProcess
IoGetCurrentProcess
KeStackAttachProcess
PsLookupProcessByProcessId
strlen
RtlInitAnsiString
ExFreePoolWithTag
fltmgr.sys
FltStartFiltering
FltRegisterFilter
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ