Static task
static1
General
-
Target
12e885b1aaa4d5baf83bdd5c9a6b91ac
-
Size
3KB
-
MD5
12e885b1aaa4d5baf83bdd5c9a6b91ac
-
SHA1
8778309b78866f038019ef0a9a516da85ba5b05d
-
SHA256
f89957c5432bf9fe3df65658b0df4b4f1bcd1dcb2db5e4a51191eea277e5c36e
-
SHA512
211c0ebce8456f21a1000db97e33d2caf622ea44c6b8f2282955eff0892603d0825470e70a08ef4e34202e080191a88e0a5a7a12e70e7d0b99bef5de9e7b7edb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12e885b1aaa4d5baf83bdd5c9a6b91ac
Files
-
12e885b1aaa4d5baf83bdd5c9a6b91ac.sys windows:5 windows x86 arch:x86
2b1180ca148c92a6a38a5eb5a8c9cb0c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IofCompleteRequest
ExFreePoolWithTag
_stricmp
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwClose
ObOpenObjectByPointer
KeDetachProcess
ZwTerminateProcess
KeAttachProcess
MmUnmapViewOfSection
PsLookupProcessByProcessId
IoCreateSymbolicLink
IoCreateDevice
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 510B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 134B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ