Static task
static1
General
-
Target
732e7a02f10386d1b00f4cb0c442f458
-
Size
16KB
-
MD5
732e7a02f10386d1b00f4cb0c442f458
-
SHA1
e16b435f389f4f6799ecdab9d99012530155ea4d
-
SHA256
7bf44a92ef86062fd7ad1f4aa82e2a4a0b23f3ef2df43c362980ca6685e79f16
-
SHA512
a3feec3becd5fd203adfcabf37f42e46a7a1f309169791c9597629e090a6bbcb2d1ff8159d5a5046cfdb913d1dd39c549c61235697734ab74534bc76a841e305
-
SSDEEP
48:S7uBo7Uktd5Cra/CkSjdYwSMOA1Bn7zD3AjvDqQkVfR5xFzt:bBOx4a/CkS+wDO657zD3AjvtGDxz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 732e7a02f10386d1b00f4cb0c442f458
Files
-
732e7a02f10386d1b00f4cb0c442f458.sys windows:5 windows x86 arch:x86
cfd699d0ba646297b082df8082549e2c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memcpy
IoDeleteSymbolicLink
RtlInitUnicodeString
IoDeleteDevice
MmGetSystemRoutineAddress
PsTerminateSystemThread
IofCompleteRequest
PsGetVersion
KeServiceDescriptorTable
ObfReferenceObject
IoCreateSymbolicLink
ObfDereferenceObject
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ