Static task
static1
General
-
Target
0aea646f712b70029d6111235262ba7a
-
Size
5KB
-
MD5
0aea646f712b70029d6111235262ba7a
-
SHA1
3e6e40c63fd4584693f1da585519ae5e38f6dd19
-
SHA256
34c925bdb9c10b602c2fd34cc173aefef6cf89a20bd76c352a66ef797796a2f8
-
SHA512
e944a1af47a5df15485cca45bf3fd59b77ae3c7c500035c6ec75582c4a0f123bc30b6456d1ccac2a04d54ba8dddc7a037dfa8d1cd9985dbbe5c9059d86e05138
-
SSDEEP
96:cI42FlgcA4sHndetl/crz1apkHuE7QLiq:Pfngc5ueEf1MkHueQ2q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0aea646f712b70029d6111235262ba7a
Files
-
0aea646f712b70029d6111235262ba7a.sys windows:5 windows x86 arch:x86
790a705bb6e01a5ec06e60aeca34cb54
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
DbgPrint
ExFreePoolWithTag
KeUnstackDetachProcess
ProbeForRead
KeStackAttachProcess
ExAllocatePoolWithTag
PsLookupProcessByProcessId
_except_handler3
ProbeForWrite
MmIsAddressValid
IoDeleteDevice
IoDeleteSymbolicLink
IofCompleteRequest
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
KeTickCount
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 554B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ