Static task
static1
General
-
Target
a5742ca3c9eaf6343afa99233e5f9bccb56cc3614c58f83cc5c86970952c56c6
-
Size
39KB
-
MD5
679e4141eb70ee2885f703ad77e8ffd1
-
SHA1
7a9e0ebb7cb5edfb3fbc5b6df0dcc1226e54fb41
-
SHA256
a5742ca3c9eaf6343afa99233e5f9bccb56cc3614c58f83cc5c86970952c56c6
-
SHA512
163ff4b32f0077753fdf7183e5601c40be633f493d63b4316a19bfffdd3540f33eb6315461b8f47e4202d49fa31563006d1282a81e0a20855da858256e966c31
-
SSDEEP
768:yCMghJ4zokntXSgh3VFb4mCgtkczKvypc90OLsDHn95N1CcTNMkh:zlhuodghlFbHNkczmb90ZPscOU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5742ca3c9eaf6343afa99233e5f9bccb56cc3614c58f83cc5c86970952c56c6
Files
-
a5742ca3c9eaf6343afa99233e5f9bccb56cc3614c58f83cc5c86970952c56c6.sys windows:6 windows x64 arch:x64
2d5e90f1a81f97008887accb0df73b20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
isdigit
isspace
memchr
_strnicmp
strncpy
strstr
RtlInitAnsiString
RtlInitUnicodeString
RtlAnsiStringToUnicodeString
RtlUnicodeStringToAnsiString
RtlFreeUnicodeString
RtlFreeAnsiString
KeInitializeEvent
KeSetEvent
KeWaitForSingleObject
ExAllocatePool
ExAllocatePoolWithTag
ExFreePoolWithTag
MmProbeAndLockPages
PsCreateSystemThread
IoAllocateIrp
IoAllocateMdl
IoBuildDeviceIoControlRequest
IofCallDriver
IoCancelIrp
IofCompleteRequest
IoCreateDevice
IoCreateFile
IoFreeIrp
IoFreeMdl
IoGetDeviceObjectPointer
IoGetRelatedDeviceObject
IoRegisterShutdownNotification
IoUnregisterShutdownNotification
ObReferenceObjectByHandle
ObfDereferenceObject
ZwCreateFile
ZwQueryInformationFile
ZwReadFile
ZwWriteFile
ZwClose
ZwCreateKey
ZwOpenKey
ZwFlushKey
ZwSetValueKey
MmIsAddressValid
IoGetFileObjectGenericMapping
PsLookupProcessByProcessId
IoGetDeviceAttachmentBaseRef
ZwDeleteFile
_vsnprintf
RtlIpv4StringToAddressExA
ObCreateObject
PsGetProcessWow64Process
SeCreateAccessState
ZwQuerySystemInformation
__C_specific_handler
strcmp
IoFileObjectType
KeBugCheckEx
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ