Static task
static1
General
-
Target
6f7f4c0fcde634145e96338d6994ad6e
-
Size
40KB
-
MD5
6f7f4c0fcde634145e96338d6994ad6e
-
SHA1
bd81f7fdb4f90d04bff868304848ba4f87bac30f
-
SHA256
e968a7164d8c1b8bd3c5c587ba30cf21050b3f1352b67e0a93e780a6d719b366
-
SHA512
3edb6f2cd3270b2336e5193acf32b750aaa5ebe1b138c1cfb37386348aab7a823b8cdb3ee96c9e2616a899e449715dcf2b816a9f853b0f0c1a8bf65af4bd3581
-
SSDEEP
768:yP0roF+crcxXlMebXyLzQ9TkT86AIEXlHJznVBImB9q4QeNwn4aPpTRgLSLO:yP0roFBmMsXozQ9AVGFnVBImBs4QeNhq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f7f4c0fcde634145e96338d6994ad6e
Files
-
6f7f4c0fcde634145e96338d6994ad6e.sys windows:4 windows x86 arch:x86
b4b7270c6cf028086aafe89a39d8e73d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
PsGetVersion
ZwSetValueKey
ObReferenceObjectByHandle
_snwprintf
ExAllocatePoolWithTag
RtlInitUnicodeString
IoRegisterDriverReinitialization
ObfDereferenceObject
MmIsAddressValid
ZwOpenKey
wcsncpy
wcsrchr
KeDelayExecutionThread
KeQuerySystemTime
strncmp
IoGetCurrentProcess
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwDeleteKey
swprintf
ZwCreateFile
ExFreePool
_snprintf
ZwQueryValueKey
_wcsicmp
ZwCreateKey
wcslen
IoDeviceObjectType
PsSetCreateProcessNotifyRoutine
wcscat
wcscpy
_stricmp
wcsstr
_wcslwr
KeTickCount
KeQueryTimeIncrement
MmGetSystemRoutineAddress
_wcsnicmp
strncpy
PsLookupProcessByProcessId
RtlCompareUnicodeString
_except_handler3
PsCreateSystemThread
RtlCopyUnicodeString
RtlAnsiStringToUnicodeString
IofCompleteRequest
ZwSetInformationFile
wcschr
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 96B - Virtual size: 91B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ