Static task
static1
General
-
Target
07ceea0ba7618b9454eb69494a139ef3
-
Size
47KB
-
MD5
07ceea0ba7618b9454eb69494a139ef3
-
SHA1
0c0c14b72f689cefea3ea50152f65adc97a174a4
-
SHA256
5ad610c71afdbe10b4db4a9f10181acbd2aed6e6b6036016964304ddd58a6bf6
-
SHA512
0b8c006dea676a6bb97b8a85dcf7ac6b21792360decc897b3eb74fa6722a1d1a472ed526a02ed59f31f980492573000c526b685a6b512fc54ee787686cb454ca
-
SSDEEP
384:2HcfpBuEEp5N4mPmh688YLU2jQsMJg3+KGDTLpFgBy:28xsmh68BLU9sM4GnLpyBy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07ceea0ba7618b9454eb69494a139ef3
Files
-
07ceea0ba7618b9454eb69494a139ef3.sys windows:4 windows x86 arch:x86
f37e268d8a07c4a1b4f9ad9aeddedd13
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeServiceDescriptorTable
ZwDeviceIoControlFile
IofCompleteRequest
memcpy
strncmp
strlen
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoGetCurrentProcess
IoCreateSymbolicLink
IoCreateDevice
RtlFreeUnicodeString
RtlCompareUnicodeString
RtlAnsiStringToUnicodeString
_snprintf
PsGetCurrentProcessId
ExFreePool
memset
ExAllocatePoolWithTag
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 538B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 238B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ