Static task
static1
General
-
Target
c1ef8ad2ce71210719fea0fd583d2fa9990fb50395f90bd0c634632459d0d4b9
-
Size
587KB
-
MD5
bbe4c1bf4f9212fb66722683d983ebea
-
SHA1
75ad4097c7f22f8ca06f411231fa084f736df581
-
SHA256
c1ef8ad2ce71210719fea0fd583d2fa9990fb50395f90bd0c634632459d0d4b9
-
SHA512
69b05eeba545ef618ff7e9f1d56360158bfde641464f6669769ea0d0630000060890a1262e183f3e567adada9275ce89a1691f4ff565189bba9cc3738ea81702
-
SSDEEP
6144:ZKCzIZTYYxFc8KfvTDgl7ovfs5sstGo5Rcd8xo:ZKhZjKfm54ORDS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c1ef8ad2ce71210719fea0fd583d2fa9990fb50395f90bd0c634632459d0d4b9
Files
-
c1ef8ad2ce71210719fea0fd583d2fa9990fb50395f90bd0c634632459d0d4b9.sys windows:10 windows x64
baad1089c22b0a8e9f89b994e00cef97
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
fltmgr.sys
FltReleaseFileNameInformation
FltGetFileNameInformationUnsafe
ntoskrnl.exe
ExAllocatePoolWithTag
ExFreePoolWithTag
ObReferenceObjectByHandle
ObReferenceObjectByPointer
ObfDereferenceObject
ZwClose
PsGetCurrentThreadId
__C_specific_handler
IoFileObjectType
ZwCreateFile
ZwReadFile
ZwWriteFile
ZwQueryFullAttributesFile
ZwDeleteFile
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
RtlInitUnicodeString
MmGetSystemRoutineAddress
MmIsAddressValid
RtlCopyUnicodeString
ZwCreateKey
ZwOpenKey
ZwQueryValueKey
ZwSetValueKey
IofCompleteRequest
IoRegisterShutdownNotification
RtlRandomEx
ZwFlushBuffersFile
KeInitializeEvent
KeSetEvent
KeWaitForSingleObject
PsCreateSystemThread
PsTerminateSystemThread
PsThreadType
ZwQueryInformationFile
wcscat_s
ExAllocatePool
ZwDeleteKey
ZwEnumerateKey
ZwFlushKey
ZwQueryKey
strcpy_s
RtlUnicodeStringToAnsiString
RtlFreeAnsiString
RtlGetVersion
KeAcquireGuardedMutex
KeReleaseGuardedMutex
KeClearEvent
KeInitializeGuardedMutex
IoCreateDevice
IoCreateNotificationEvent
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
KeAreAllApcsDisabled
KeQueryTimeIncrement
ZwQuerySystemInformation
wcslen
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
ZwDeleteValueKey
ZwOpenFile
ZwCreateSection
wcsrchr
RtlAppendUnicodeStringToString
ZwUnloadDriver
PsGetCurrentProcessId
MmMapViewInSystemSpace
MmUnmapViewInSystemSpace
RtlImageDirectoryEntryToData
strlen
MmProbeAndLockPages
MmUnlockPages
MmMapLockedPagesSpecifyCache
IoAllocateMdl
IoFreeMdl
_strupr
KeBugCheckEx
KeDelayExecutionThread
RtlInt64ToUnicodeString
hal
KeStallExecutionProcessor
KeQueryPerformanceCounter
Sections
.text Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 637KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tvm0 Size: 392KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ