Static task
static1
General
-
Target
58e28f748bd4b5b6cd190608c86b2074
-
Size
3KB
-
MD5
58e28f748bd4b5b6cd190608c86b2074
-
SHA1
6236df3373c32768f160ed8507e77805b3a64ba8
-
SHA256
e5a3cdc51583c7aa82fa6545fccaa6d31bc17c87e0cd70e38da0ce7c11d0da76
-
SHA512
14aac79ee017cb00b2ad273f29a778a4b06e1cc478f7b90cb2875a64ae2cb7e17484ed84abda616f33d0509c2b71d1b60383f7efdbd1648f3538b7615139526a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 58e28f748bd4b5b6cd190608c86b2074
Files
-
58e28f748bd4b5b6cd190608c86b2074.sys windows:5 windows x86 arch:x86
2be5d4c7d34f01780ed31a60890baee6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExFreePoolWithTag
ExAllocatePoolWithTag
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
IofCompleteRequest
PsTerminateSystemThread
ObReferenceObjectByHandle
PsCreateSystemThread
ObfDereferenceObject
PsLookupProcessByProcessId
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
KeWaitForSingleObject
MmGetSystemRoutineAddress
hal
KfRaiseIrql
KeGetCurrentIrql
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 163B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 566B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 146B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.mauo Size: 128B - Virtual size: 128B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE