Static task
static1
General
-
Target
45e4b0e2c1fcf714934382be40a6fce1
-
Size
10KB
-
MD5
45e4b0e2c1fcf714934382be40a6fce1
-
SHA1
8f0b43564d33c44af209c9eb658e17e171baa7ac
-
SHA256
19d22741551991f2582eb9fb3e9f8a6c6cd557ea59f2a1f41f4ca56d23189412
-
SHA512
7c814e2add47018356bddd3db39ab05cb080b8051f34a8a249b6baca2d15beb6b1d3199d8ae9c66df241667fb022a5b471e0c01643d7cfb3b9338bae6815e748
-
SSDEEP
96:wuuXVHpVXkEvpE20K+RLDhcFoHcKIX0Ym+c8Inl6r2IM7yf41e/myiQxM5hQR:wuuXVHp9kg30b7PYkYmN8TqtS41e/mba
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45e4b0e2c1fcf714934382be40a6fce1
Files
-
45e4b0e2c1fcf714934382be40a6fce1.sys windows:4 windows x86 arch:x86
d91af52c8b056138d1cb849fed07901e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncpy
memmove
ExFreePool
ExAllocatePoolWithTag
IofCompleteRequest
NtQueryDirectoryFile
NtQuerySystemInformation
IoGetCurrentProcess
ZwQueryObject
strncmp
RtlInitUnicodeString
wcscmp
wcscpy
IoCreateSymbolicLink
IoCreateDevice
KeInitializeSpinLock
NtDeviceIoControlFile
IoDeleteDevice
IoDeleteSymbolicLink
_wcsupr
hal
KfAcquireSpinLock
KfReleaseSpinLock
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 363B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 586B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ