Static task
static1
General
-
Target
NEAS.624ca20005c64c4f96dc0fdc615f0710.exe
-
Size
512KB
-
MD5
624ca20005c64c4f96dc0fdc615f0710
-
SHA1
67ce5a59b412027226ec8d37c3a21ae807c8b9c2
-
SHA256
b2a2b5a5421b2d4d96ae53638b2dc21616674fc6af2bd6477b149801c6bfaccd
-
SHA512
1f0ce87f8a2940a2018f1ccdf56232a07c4abe0e6bd8992bc87933927431baab644e9e7f3286995e8cb409968d81d86c34080015899473c8a02a847343f35453
-
SSDEEP
6144:g5VMJD0D2ym/oSHqmyaR42g1lPVlYpdskWcveXBH++YL/oJopuu/lgvotWs/73gl:gIwDQwqR424xVlysmJaYWsjwZjWgD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.624ca20005c64c4f96dc0fdc615f0710.exe
Files
-
NEAS.624ca20005c64c4f96dc0fdc615f0710.exe.sys windows:6 windows x64
c2a3d4a4dada577beefbc0aec8eb98bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
IoRegisterDeviceInterface
IoSetDeviceInterfaceState
RtlInitUnicodeString
IoDeleteDevice
KeSetEvent
KeInitializeEvent
IoDetachDevice
RtlFreeUnicodeString
PoStartNextPowerIrp
IofCompleteRequest
KeWaitForSingleObject
IoAttachDeviceToDeviceStack
PoCallDriver
IoCreateDevice
IofCallDriver
KeBugCheckEx
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PAGE Size: 1024B - Virtual size: 651B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ