Static task
static1
Behavioral task
behavioral1
Sample
0ab716cd405984e88006c32a951ec498.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ab716cd405984e88006c32a951ec498.dll
Resource
win10v2004-20231215-en
General
-
Target
0ab716cd405984e88006c32a951ec498
-
Size
5KB
-
MD5
0ab716cd405984e88006c32a951ec498
-
SHA1
02207475dea435b5e3437a2a5d739357fee3d895
-
SHA256
7214912e9e7d9c08c83619285874e906ca5852e3221f5bab827970d4e1715775
-
SHA512
f1c282ad7db15462b3e3fccbe8877a4fe18210d5a43936a75a244c333c052a164bf894a5f59caf2cf320fcc97c072196b9187f2df1364a2c5aeda335aeb517e2
-
SSDEEP
48:q8+5Z0anjBKgwbSZYOYqwp3IbZz5itywTgwiVLo/vR4:UWaxwbSGA64bZz5it0U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ab716cd405984e88006c32a951ec498
Files
-
0ab716cd405984e88006c32a951ec498.dll windows:5 windows x86 arch:x86
7ba58d4f1daabcedc5c5612e53c1b6a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntoskrnl.exe
IofCompleteRequest
ObfDereferenceObject
ZwClose
ZwAllocateVirtualMemory
ObOpenObjectByPointer
PsLookupProcessByProcessId
MmIsAddressValid
ZwOpenProcess
KeServiceDescriptorTable
ExAllocatePoolWithTag
memset
memcpy
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 648B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ