Static task
static1
General
-
Target
1a8cbf1b75a5968a2683a76a958d90d4
-
Size
4KB
-
MD5
1a8cbf1b75a5968a2683a76a958d90d4
-
SHA1
88755754d80c785352d60c949d2e13cc2a8d4cf5
-
SHA256
e8cb078926815a24c114a643f2a1c4326e579e0b2d472523aec26c9e85518e7b
-
SHA512
ae5585886de2d3c68d7fd599aa942ab3d09858cdb1aa95e814952089c7522d60b77ce19e2679801fb26c278b4082c5b2923a30c9d85ecd8cec374e87e735501f
-
SSDEEP
96:nxQxcVlX8l4lLyECMC6UBX4TpcODtnO1c3Fm1eK:nxXjXzC/HBXUpclIFx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a8cbf1b75a5968a2683a76a958d90d4
Files
-
1a8cbf1b75a5968a2683a76a958d90d4.sys windows:5 windows x86 arch:x86
171c054306b4290d19503533557a0e4e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlCompareMemory
DbgPrint
ZwOpenKey
RtlInitUnicodeString
ObfDereferenceObject
ObReferenceObjectByHandle
IoDeleteDevice
IoDeleteSymbolicLink
strncpy
ZwQueryDirectoryFile
IofCompleteRequest
MmGetSystemRoutineAddress
ZwClose
PsGetVersion
IoCreateSymbolicLink
IoCreateDevice
IoGetCurrentProcess
KeServiceDescriptorTable
strncmp
hal
KfLowerIrql
KeRaiseIrqlToDpcLevel
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 256B - Virtual size: 144B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 586B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ