Static task
static1
Behavioral task
behavioral1
Sample
602fd4fa2f225ad8148899fe4fc54ce5.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
602fd4fa2f225ad8148899fe4fc54ce5.dll
Resource
win10v2004-20231215-en
General
-
Target
602fd4fa2f225ad8148899fe4fc54ce5
-
Size
40KB
-
MD5
602fd4fa2f225ad8148899fe4fc54ce5
-
SHA1
2b59b5709f03775728dafadb663f6de5c796105c
-
SHA256
6be315b49d926fc6405284355287cba08a7f5c470d21868467915864026dcc04
-
SHA512
2abb350a6ddf7cfcbd90365cb080b4334ee25dc874432625a620c2792eb2366493179ea34931dad790682bc8a7127b524edf44e9f46fc54a879d45aacd7ad13d
-
SSDEEP
768:p8JHDQkqu5gvjuj9H5R3g+xu0aHf43I+SH/Z:eMkqEgvjMl7uLA3A/Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 602fd4fa2f225ad8148899fe4fc54ce5
Files
-
602fd4fa2f225ad8148899fe4fc54ce5.dll windows:5 windows x86 arch:x86
71bd8c1d9f0e56ea2861391e20e6bf24
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntoskrnl.exe
RtlCopyLuid
ExNotifyCallback
CcZeroData
atoi
IoConnectInterrupt
IoFreeMdl
ExDeletePagedLookasideList
RtlCheckRegistryKey
ObReferenceObjectByHandle
RtlInitString
MmGetSystemRoutineAddress
KeSetTimerEx
RtlEqualString
CcFastCopyRead
RtlRandom
IoDeleteController
RtlEqualUnicodeString
RtlUnicodeToOemN
PsGetCurrentThread
ZwMapViewOfSection
ExRegisterCallback
PoSetSystemState
RtlInitUnicodeString
ZwEnumerateValueKey
ZwFreeVirtualMemory
RtlCompareString
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 800B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ