Static task
static1
General
-
Target
04d50e18daec8c105416769b5b622e74
-
Size
21KB
-
MD5
04d50e18daec8c105416769b5b622e74
-
SHA1
dcb9c6ce66b5c486d9f7dc4aac259dfb72e0d7df
-
SHA256
5ae45574c763598d8d1cbae3a287f48a8888e5f82efe820964a27066ce9ed0d6
-
SHA512
a26c6eadbfe5a828c06300b5a74cdeda63535005fb260a73abb64f4c25568ea632490ab5ef72c04c783f4da0d7bb107ab26d864d5c1920cba64140250d90c9f4
-
SSDEEP
96:ZIqin/S3+C5uvFy8iCFsOwisEfkZ/pIwK8OHJ6lYcHZX6ogGK4PQFXVCo:9inA+HvwFNvZ/pyTYYcHFVzP8V5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 04d50e18daec8c105416769b5b622e74
Files
-
04d50e18daec8c105416769b5b622e74.sys windows:5 windows x86 arch:x86
e3787c5d0593657b80ab573899a2f88e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
MmIsAddressValid
RtlFreeAnsiString
_strupr
RtlUnicodeStringToAnsiString
strncmp
IoGetCurrentProcess
strrchr
PsGetCurrentThreadId
PsGetCurrentProcessId
strstr
PsLookupProcessByProcessId
strncpy
RtlInitUnicodeString
KeServiceDescriptorTable
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwReadFile
ZwClose
ZwCreateFile
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 224B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 96B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 736B - Virtual size: 732B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 448B - Virtual size: 444B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ