Static task
static1
Behavioral task
behavioral1
Sample
238fc8d52015fefa127f25a023b40b7e7ba59f7bab2c61d1d293054872d0c286.dll
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
238fc8d52015fefa127f25a023b40b7e7ba59f7bab2c61d1d293054872d0c286.dll
Resource
win10v2004-20231020-en
General
-
Target
238fc8d52015fefa127f25a023b40b7e7ba59f7bab2c61d1d293054872d0c286
-
Size
92KB
-
MD5
9f34ccb442ff7647549fec92bb160473
-
SHA1
d937d2dc2b792c04df9a6992ea44ec72a9476a55
-
SHA256
238fc8d52015fefa127f25a023b40b7e7ba59f7bab2c61d1d293054872d0c286
-
SHA512
bb3967bc08c81eddb441b860544b786bccc5dab2ae78e1812de971d174cb72bbf86e1ca0cc6098206cb50a57061a5cbcbeadc3b5286342e3c578d289016cadff
-
SSDEEP
1536:w52lsAI46O8ed9y61G6X7vitvXVA9H0vQHKybNssYFYvxFfKd9NC:w5RAjeed9y6Yg7vsvX80vaKybNPYYvUE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 238fc8d52015fefa127f25a023b40b7e7ba59f7bab2c61d1d293054872d0c286
Files
-
238fc8d52015fefa127f25a023b40b7e7ba59f7bab2c61d1d293054872d0c286.dll windows:5 windows x64
8f1a776c4dcdca64cb6af9bbcae53d21
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
ntoskrnl.exe
ObReferenceObjectByName
IoDriverObjectType
RtlInitUnicodeString
ExFreePoolWithTag
strstr
RtlCompareMemory
ExAllocatePoolWithTag
ExAllocatePool
KeSetEvent
KeBugCheckEx
IoFreeIrp
KeClearEvent
KeWaitForSingleObject
IoAllocateIrp
IoGetRelatedDeviceObject
KeInitializeEvent
ZwClose
SeCreateAccessState
IoGetFileObjectGenericMapping
ObCreateObject
ObReferenceObjectByHandle
IoFileObjectType
IoCreateFile
IofCallDriver
NtClose
IoReuseIrp
ZwReadFile
ZwQueryInformationFile
ZwCreateFile
RtlAppendUnicodeToString
ZwSetInformationFile
ZwWriteFile
ObfReferenceObject
strlen
ZwDeleteFile
wcscat
wcscpy
wcslen
ZwQueryDirectoryFile
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQueryTimeIncrement
ZwDeleteKey
ZwOpenKey
RtlAppendUnicodeStringToString
RtlCopyUnicodeString
ZwEnumerateKey
ZwQueryKey
ObfDereferenceObject
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwQueryValueKey
MmMapLockedPagesSpecifyCache
_strnicmp
MmBuildMdlForNonPagedPool
IoAllocateMdl
_vsnprintf
__C_specific_handler
atoi
IoBuildDeviceIoControlRequest
IoGetLowerDeviceObject
MmUnlockPages
MmProbeAndLockPages
IoFreeMdl
PsGetVersion
MmGetSystemRoutineAddress
rand
srand
CmUnRegisterCallback
CmRegisterCallback
RtlCompareUnicodeString
ZwCreateKey
RtlQueryRegistryValues
MmSystemRangeStart
_itoa_s
PsCreateSystemThread
IoCreateSymbolicLink
RtlUnicodeStringToAnsiString
_vsnwprintf
IoCreateDevice
IoAttachDeviceToDeviceStack
IoGetDeviceObjectPointer
IofCompleteRequest
KeDelayExecutionThread
ObQueryNameString
RtlFreeAnsiString
ZwQueryObject
ZwDuplicateObject
ZwOpenProcess
ZwQuerySystemInformation
KeUnstackDetachProcess
ObSetHandleAttributes
PsInitialSystemProcess
IoGetCurrentProcess
KeStackAttachProcess
PsLookupProcessByProcessId
MmIsAddressValid
ZwSetValueKey
IoDetachDevice
fltmgr.sys
FltStartFiltering
FltRegisterFilter
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ