Static task
static1
General
-
Target
0a7b1d73818ff0f4870b526a8a4a1b9f
-
Size
20KB
-
MD5
0a7b1d73818ff0f4870b526a8a4a1b9f
-
SHA1
3159f9362045db92ab0fb95ae27128c085abc6da
-
SHA256
7ddeb317f1fe0e56cbecdfa5911f8efa25c568bca694b7d7b26ebe4047ee8eda
-
SHA512
38620a622ddf5d99f23e2b920dbb768f68c78d09dc26cbeb40cb31bea5d0e48ea9cf2856fefd181c43b6441231aef96e97db407c544b70d2268295cb16832ecc
-
SSDEEP
384:mfGZyqNoCp8fmbCFlCujeJBAjMHsIpiKnE4T7pYF4u3UVaDwBt3oZSbMtGPSxIOr:gaj6fesIpiKE4T7pYF4u3UVaDwBt3oZG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a7b1d73818ff0f4870b526a8a4a1b9f
Files
-
0a7b1d73818ff0f4870b526a8a4a1b9f.sys windows:4 windows x86 arch:x86
79a838358a088436b132be8cafa5fac6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoGetCurrentProcess
strncmp
_except_handler3
RtlCompareUnicodeString
RtlInitUnicodeString
ExGetPreviousMode
KeServiceDescriptorTable
ZwSetValueKey
PsGetVersion
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
_wcsnicmp
wcslen
ZwClose
ZwCreateFile
IofCompleteRequest
MmGetSystemRoutineAddress
_stricmp
strstr
ZwQueryValueKey
ExFreePool
ZwCreateKey
wcscat
wcscpy
ExAllocatePoolWithTag
PsCreateSystemThread
strncpy
PsLookupProcessByProcessId
ZwWriteFile
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwOpenKey
_snwprintf
ZwEnumerateKey
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 864B - Virtual size: 864B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ