I:\cbwNxmsyldtbeG\ftbEbKqm\bnGzmRrdp\xcsdrdbcCsZVTz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
997f0631638ef9cf5c39f75a31306f02.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
997f0631638ef9cf5c39f75a31306f02.dll
Resource
win10v2004-20231222-en
General
-
Target
997f0631638ef9cf5c39f75a31306f02
-
Size
332KB
-
MD5
997f0631638ef9cf5c39f75a31306f02
-
SHA1
b395d0cd6c451e57c043b3a2b8aedc2d7284d59a
-
SHA256
9e44398349f3e131a04d781800fba3f97fc678675a4265afea4abf022024132c
-
SHA512
2dd99ab84908946d5e5b914637df9531685d760fd8c56f6d8e28d096c28055b3aa15083f6956ed4bfedacaa2b7971fa8f1e6a5f5925b34e64f6f1ad4d907de0c
-
SSDEEP
6144:5r5pH70z5la/n/jtglEoa4vHg+u83lyn1q+/jst8KHfjIckkQYdWihh19:5r5V0Ta6lZa4fg+e1q+/4ttHfjIc7Qk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 997f0631638ef9cf5c39f75a31306f02
Files
-
997f0631638ef9cf5c39f75a31306f02.dll windows:5 windows x86 arch:x86
456f489803c24f4fc0f92c2c62d387d6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
KeRemoveDeviceQueue
IoGetCurrentProcess
IoSetSystemPartition
SeQueryAuthenticationIdToken
IoCreateDisk
IoGetDeviceToVerify
SeValidSecurityDescriptor
KefAcquireSpinLockAtDpcLevel
ZwFlushKey
IoSetShareAccess
MmSizeOfMdl
CcFastCopyWrite
KeSynchronizeExecution
PsGetCurrentProcessId
RtlCreateUnicodeString
SePrivilegeCheck
RtlAddAccessAllowedAce
CcPreparePinWrite
RtlAddAccessAllowedAceEx
RtlCopyLuid
KeRevertToUserAffinityThread
MmMapIoSpace
IoRegisterFileSystem
KeQueryTimeIncrement
RtlFindNextForwardRunClear
IoVerifyVolume
KeSaveFloatingPointState
MmSetAddressRangeModified
KeInitializeQueue
MmCanFileBeTruncated
ObReleaseObjectSecurity
MmUnmapLockedPages
RtlInitAnsiString
ExVerifySuite
RtlUpcaseUnicodeToOemN
KeInsertQueueDpc
IoReuseIrp
KeQueryInterruptTime
CcUnpinData
RtlNumberOfClearBits
PoStartNextPowerIrp
CcMdlReadComplete
IoBuildSynchronousFsdRequest
SeAppendPrivileges
IoGetDeviceInterfaceAlias
RtlMultiByteToUnicodeN
IoGetAttachedDevice
IoBuildPartialMdl
RtlDelete
ExDeleteResourceLite
MmSecureVirtualMemory
IoGetDeviceProperty
CcPurgeCacheSection
KeStackAttachProcess
MmIsThisAnNtAsSystem
CcSetReadAheadGranularity
RtlFindLeastSignificantBit
SeCaptureSubjectContext
ExLocalTimeToSystemTime
SeReleaseSubjectContext
MmQuerySystemSize
ExCreateCallback
KeRemoveByKeyDeviceQueue
RtlEqualSid
ObReferenceObjectByHandle
FsRtlGetNextFileLock
RtlDeleteElementGenericTable
IoWritePartitionTableEx
KeInitializeSemaphore
KeResetEvent
IoSetTopLevelIrp
RtlEnumerateGenericTable
IoQueryFileDosDeviceName
ZwQueryObject
IoFreeWorkItem
RtlFindMostSignificantBit
SeUnlockSubjectContext
MmUnlockPages
RtlTimeToTimeFields
CcFlushCache
IoRaiseHardError
KeGetCurrentThread
CcFastCopyRead
MmUnmapReservedMapping
RtlGetNextRange
PsGetCurrentThreadId
FsRtlFreeFileLock
ExInitializeResourceLite
RtlInitializeGenericTable
IofCallDriver
IoSetHardErrorOrVerifyDevice
ZwEnumerateKey
KeSetBasePriorityThread
ExSystemTimeToLocalTime
RtlSplay
IoCheckEaBufferValidity
RtlVerifyVersionInfo
RtlExtendedIntegerMultiply
IoCreateNotificationEvent
IoCreateStreamFileObject
RtlAppendUnicodeToString
PsCreateSystemThread
ZwMakeTemporaryObject
RtlSetDaclSecurityDescriptor
PoRegisterSystemState
IoGetDmaAdapter
IoReleaseRemoveLockEx
MmAllocateMappingAddress
IoSetThreadHardErrorMode
IoInitializeIrp
IoSetDeviceToVerify
ZwCreateKey
RtlFindClearRuns
IoSetPartitionInformationEx
ZwWriteFile
MmFreeContiguousMemory
CcZeroData
MmResetDriverPaging
ObInsertObject
MmForceSectionClosed
IoCheckShareAccess
IoFreeErrorLogEntry
ExFreePool
IoRequestDeviceEject
MmFreeNonCachedMemory
IoConnectInterrupt
ExReleaseResourceLite
RtlFreeAnsiString
FsRtlFastUnlockSingle
MmIsAddressValid
MmHighestUserAddress
CcSetBcbOwnerPointer
KeRestoreFloatingPointState
IoGetTopLevelIrp
ZwQueryKey
RtlEqualUnicodeString
KeCancelTimer
KeInitializeDeviceQueue
PsGetCurrentThread
ZwUnloadDriver
FsRtlFastCheckLockForRead
IoMakeAssociatedIrp
FsRtlDeregisterUncProvider
PsReturnPoolQuota
CcMdlWriteComplete
MmProbeAndLockPages
RtlFreeOemString
RtlUnicodeStringToInteger
RtlTimeToSecondsSince1980
KeSetSystemAffinityThread
RtlQueryRegistryValues
KeAttachProcess
ExRegisterCallback
PsReferencePrimaryToken
IoWriteErrorLogEntry
KeDelayExecutionThread
IoSetDeviceInterfaceState
ZwCreateDirectoryObject
ExRaiseDatatypeMisalignment
CcRemapBcb
IoReadPartitionTableEx
ZwClose
PsImpersonateClient
RtlCopyUnicodeString
MmProbeAndLockProcessPages
KeRemoveQueueDpc
KeQueryActiveProcessors
ZwAllocateVirtualMemory
IoGetDriverObjectExtension
RtlUnicodeStringToOemString
KePulseEvent
IoGetDeviceInterfaces
ExUuidCreate
IoQueryFileInformation
IoAllocateController
FsRtlIsNameInExpression
KeBugCheck
KeUnstackDetachProcess
MmAllocateContiguousMemory
WmiQueryTraceInformation
IoGetStackLimits
CcSetFileSizes
RtlFindLastBackwardRunClear
ProbeForRead
FsRtlIsHpfsDbcsLegal
ExNotifyCallback
RtlFindLongestRunClear
SeSetSecurityDescriptorInfo
PsRevertToSelf
PoSetPowerState
RtlCompareUnicodeString
RtlGetCallersAddress
KeDetachProcess
RtlCreateAcl
RtlAppendStringToString
IoReleaseCancelSpinLock
IoStartPacket
RtlUnicodeStringToAnsiString
RtlOemToUnicodeN
RtlMapGenericMask
KeWaitForMultipleObjects
PsLookupThreadByThreadId
FsRtlNotifyInitializeSync
RtlTimeToSecondsSince1970
IoDeleteDevice
CcPinRead
IoWMIWriteEvent
RtlIsNameLegalDOS8Dot3
MmPageEntireDriver
KeSetKernelStackSwapEnable
CcPinMappedData
IoSetStartIoAttributes
KeSetTargetProcessorDpc
KeQuerySystemTime
ExAllocatePool
FsRtlAllocateFileLock
ZwEnumerateValueKey
IofCompleteRequest
MmGetPhysicalAddress
FsRtlIsTotalDeviceFailure
IoAllocateIrp
IoReleaseVpbSpinLock
PsDereferencePrimaryToken
MmUnlockPagableImageSection
RtlCheckRegistryKey
IoCreateFile
FsRtlSplitLargeMcb
ZwQueryInformationFile
ObGetObjectSecurity
IoRegisterDeviceInterface
ZwFreeVirtualMemory
KeRegisterBugCheckCallback
IoThreadToProcess
ZwDeleteValueKey
RtlGUIDFromString
CcMapData
PsTerminateSystemThread
RtlCharToInteger
IoInvalidateDeviceRelations
PoRequestPowerIrp
RtlLengthRequiredSid
ZwMapViewOfSection
MmFreePagesFromMdl
KeInsertHeadQueue
SeFreePrivileges
ZwFsControlFile
SeTokenIsRestricted
KeInitializeTimer
RtlSubAuthoritySid
IoInitializeRemoveLockEx
KdEnableDebugger
ExQueueWorkItem
IoCsqRemoveIrp
ExDeleteNPagedLookasideList
KeBugCheckEx
KeSetTimerEx
PsChargeProcessPoolQuota
ExAllocatePoolWithTag
KdDisableDebugger
MmIsDriverVerifying
SeImpersonateClientEx
RtlInt64ToUnicodeString
Sections
.text Size: 34KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.i_txt Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.e_txt Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tele3 Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tele1 Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tele2 Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tele4 Size: 512B - Virtual size: 460B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ