Static task
static1
General
-
Target
06cb0ef480794c2cda264e887a61a6f8
-
Size
25KB
-
MD5
06cb0ef480794c2cda264e887a61a6f8
-
SHA1
dea06f9542bd2d959fc495a6638df0ac3d297849
-
SHA256
455bb934d3582a90e515044dcd7fda4719b95e0b5220f4ac3d80065d2297a7e8
-
SHA512
dd6aef2746e716abd21b2de9d9f44f13705b92a896528df30d47a29d25f348dabcfc9562bf707607c28627f012eb4e71d13afb399407b408c288c870803b1e08
-
SSDEEP
384:w68wm2kaRjhmxGR74jo/VxtlG9TqV2CGuek0x4gON+8dR7z9SCA/gEb3u/TvykiD:w6K2X7N0jcbWRLKN+fTtyn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06cb0ef480794c2cda264e887a61a6f8
Files
-
06cb0ef480794c2cda264e887a61a6f8.sys windows:5 windows x86 arch:x86
33b0db099104fd4b5b5f6731890a95be
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
swprintf
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlInitUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
MmIsAddressValid
ZwUnmapViewOfSection
ZwCreateFile
IoRegisterDriverReinitialization
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
wcscat
wcscpy
ZwEnumerateKey
ZwSetValueKey
ZwOpenKey
ZwCreateKey
PsGetVersion
_wcslwr
wcsncpy
RtlAnsiStringToUnicodeString
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 622B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ