Static task
static1
General
-
Target
04399235b31c0c03ab4aa32a1881ec05
-
Size
26KB
-
MD5
04399235b31c0c03ab4aa32a1881ec05
-
SHA1
efb2ad2ef00c65a7eabc9a23ba4033eee1103d62
-
SHA256
96bee4827ffe9b73b1a135fd4280fcfa906a35555edf174bb23c25708a7278c3
-
SHA512
8e2bd74054de7c1e69506355f21704cf867307a6de75c365e2b94e305094c24a67db62d97e5fcad00bc815af69f3988e95b05677fdaea7ea2e76b0d9be3beea7
-
SSDEEP
384:RpvpHwHBl5eYNdXlR7rFu9/mOTpxlUOLBy62TcGPr5SB0rJtKNYlZacUbHUdNYeH:HxH6lcYNfRP+r2RDYYN5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04399235b31c0c03ab4aa32a1881ec05
Files
-
04399235b31c0c03ab4aa32a1881ec05.sys windows:5 windows x86 arch:x86
40671ebacf143cba857d9c94d374fa88
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwCreateFile
ZwSetValueKey
ZwClose
ZwOpenKey
ZwEnumerateKey
PsGetVersion
_wcslwr
wcsncpy
RtlInitUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
MmIsAddressValid
ZwUnmapViewOfSection
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
wcscat
wcscpy
IoRegisterDriverReinitialization
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwCreateKey
RtlAnsiStringToUnicodeString
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 634B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ