Static task
static1
General
-
Target
6cc94395c00539ca8626477aecb115fd
-
Size
8KB
-
MD5
6cc94395c00539ca8626477aecb115fd
-
SHA1
e37937d833c4d78cbb5ee0660ec53e84519fdaca
-
SHA256
79f8f9488cc72f7d729a585ad159b2d598bedf2aab0c913506314b5d08eeca7d
-
SHA512
f39b2242294bb12f5603e70ba423daa4483e7ab9feab02ab322b0782c20d0f9dc12fc72e83b3e3d3764274b68cc58e6ce2e04d9fbabaeedb404f9d92b9b03336
-
SSDEEP
192:0r9S+dG3Y2xuawVKvnlQvC389J/FVTUfyEZpbw:A8iG3BMawVKvnlQvC3+7VTUfyEHw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6cc94395c00539ca8626477aecb115fd
Files
-
6cc94395c00539ca8626477aecb115fd.sys windows:5 windows x86 arch:x86
cfd699d0ba646297b082df8082549e2c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memcpy
IoDeleteSymbolicLink
RtlInitUnicodeString
IoDeleteDevice
MmGetSystemRoutineAddress
PsTerminateSystemThread
IofCompleteRequest
PsGetVersion
KeServiceDescriptorTable
ObfReferenceObject
IoCreateSymbolicLink
ObfDereferenceObject
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ