Static task
static1
General
-
Target
284762a2764c3807f7a74aef5d0bb0d7
-
Size
3KB
-
MD5
284762a2764c3807f7a74aef5d0bb0d7
-
SHA1
0b419f96a48324d025c18b394afbaa39adb18328
-
SHA256
b048366ed7313c21679abc2bf6b9226c7eaa6495d387b5d2b77de60f72d7b07b
-
SHA512
ae4815d921af2e935ecfa88a3534433fa45227ece88e005e93431c43cbc02abb859446bab712fbc116cf937f647a256d38004b9636629594125b8cd6c5578eec
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 284762a2764c3807f7a74aef5d0bb0d7
Files
-
284762a2764c3807f7a74aef5d0bb0d7.sys windows:5 windows x86 arch:x86
7aa346b913dc64be7048aef3caa8b161
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
ZwReadFile
KeServiceDescriptorTable
ZwClose
RtlFreeUnicodeString
ZwCreateFile
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 192B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192B - Virtual size: 177B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 96B - Virtual size: 69B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 480B - Virtual size: 462B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ