J:\koKPykT\ihqbsrAaZPohr\DhJzpwkeIUqTe\jdBgatneKavEgZ\BxeBuiObEjt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8de065811a7db2e39c86757bd8f21485.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8de065811a7db2e39c86757bd8f21485.dll
Resource
win10v2004-20231222-en
General
-
Target
8de065811a7db2e39c86757bd8f21485
-
Size
331KB
-
MD5
8de065811a7db2e39c86757bd8f21485
-
SHA1
c5d7588cfc865802ae0a749dfe44f1cefcbb77d2
-
SHA256
8d0881151b2ae41a59b1d9df793b8dca554fb0098cfcaa67acd075bb520cda3d
-
SHA512
91ecab1c35c76e43048010eda8aeb24f8f52e77a7174a30fd686043747f96aeebd1afd00c65c1cb300073337a13195ef3c28258c3d471364e4910c95edddefad
-
SSDEEP
6144:6Hsuqkfuq7Cqi/zznv4sGA8sxWae6u2Bya/rtU61I+AK3uK6HxjnLJtQodWihh18:juffeqWLus4ae6lyap1I+Ayu7HxjnLbq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8de065811a7db2e39c86757bd8f21485
Files
-
8de065811a7db2e39c86757bd8f21485.dll windows:5 windows x86 arch:x86
481ffb1f4aabdcb920afd0797b455cd3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
IoAllocateWorkItem
CcMdlWriteAbort
ExGetExclusiveWaiterCount
VerSetConditionMask
ZwOpenSection
RtlInitString
IoSetPartitionInformationEx
IoDeviceObjectType
FsRtlLookupLastLargeMcbEntry
RtlxOemStringToUnicodeSize
MmFreeMappingAddress
CcFastMdlReadWait
ExRaiseDatatypeMisalignment
IoGetLowerDeviceObject
RtlVerifyVersionInfo
KeReadStateTimer
ExReinitializeResourceLite
PsGetProcessExitTime
FsRtlNotifyUninitializeSync
MmAddVerifierThunks
IoRegisterDeviceInterface
ZwCreateKey
IoCreateStreamFileObjectLite
ExDeleteNPagedLookasideList
CcMdlReadComplete
CcCopyWrite
RtlSplay
IoGetRequestorProcessId
ObQueryNameString
KeReleaseSemaphore
MmProbeAndLockPages
SeTokenIsAdmin
KeWaitForSingleObject
RtlUnicodeToMultiByteN
KeSetEvent
CcPurgeCacheSection
MmCanFileBeTruncated
IoVolumeDeviceToDosName
RtlUnicodeStringToAnsiString
ExAcquireFastMutexUnsafe
IoDeleteSymbolicLink
RtlFreeUnicodeString
PoSetSystemState
RtlFindSetBits
KeFlushQueuedDpcs
ZwOpenProcess
ZwQueryValueKey
IoAllocateAdapterChannel
SeTokenIsRestricted
ZwFreeVirtualMemory
KefAcquireSpinLockAtDpcLevel
IoInitializeIrp
RtlFreeAnsiString
MmQuerySystemSize
FsRtlDeregisterUncProvider
IoGetCurrentProcess
IoCheckShareAccess
ZwClose
ProbeForRead
KeInitializeSpinLock
IoGetDeviceProperty
RtlCreateSecurityDescriptor
KeDetachProcess
RtlFreeOemString
CcSetReadAheadGranularity
RtlTimeToTimeFields
RtlInitAnsiString
KeGetCurrentThread
ZwUnloadDriver
KeUnstackDetachProcess
MmMapUserAddressesToPage
MmAllocatePagesForMdl
ExVerifySuite
MmAllocateMappingAddress
RtlIntegerToUnicodeString
RtlUnicodeStringToOemString
RtlAddAccessAllowedAce
IoRequestDeviceEject
IoRegisterFileSystem
FsRtlFastCheckLockForRead
RtlxUnicodeStringToAnsiSize
FsRtlMdlWriteCompleteDev
Exports
Exports
?CancelListItemOld@@YGPAXHHG<V
?DeleteCommandLineExA@@YGPAMPAG<V
?InvalidateWindowInfoExW@@YG_NJF<V
?CloseObjectExA@@YGPAXPADPAIGM<V
?InstallFunctionExA@@YGPAFNE<V
?InstallEventNew@@YGHHM<V
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ