Static task
static1
General
-
Target
5e4ca0f78e6bd7333cf799842829e4f2
-
Size
7KB
-
MD5
5e4ca0f78e6bd7333cf799842829e4f2
-
SHA1
03a2f9a86d802b5d2fd21d34552b045f5090e878
-
SHA256
bdb0765416174ab27deed9b7f85b8349a60f2528a74598e3a9827f90805e2f50
-
SHA512
1ce8af8a1aa265eebb9093882236ca3409c1e271970c3065ab54294e15e15edf675524360f9abbcdcb91eef7348bc3c54e7aa1f584eed3d2a11a14a8d7eb33b4
-
SSDEEP
96:WfiN0uj2T5yVnBWV8pNPcC93In5H3ZIqPAxMSRSRJPtcYP:7NjWwN0CsRpIqoeS0RIC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e4ca0f78e6bd7333cf799842829e4f2
Files
-
5e4ca0f78e6bd7333cf799842829e4f2.sys windows:5 windows x86 arch:x86
c597e66fc606a604997cb3fe13d0d4fa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_except_handler3
ExFreePoolWithTag
ExAllocatePoolWithTag
ZwQuerySystemInformation
ObfDereferenceObject
ObReferenceObjectByName
IoDriverObjectType
RtlInitUnicodeString
IofCallDriver
IoBuildDeviceIoControlRequest
IoGetDeviceObjectPointer
RtlAnsiStringToUnicodeString
RtlInitString
ZwClose
ZwReadFile
ZwQueryInformationFile
ZwOpenFile
NtBuildNumber
KeServiceDescriptorTable
KeTickCount
KeBugCheckEx
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 668B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 256B - Virtual size: 230B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ