Static task
static1
General
-
Target
008428563778dd6dcb2c2e473774ba1b
-
Size
23KB
-
MD5
008428563778dd6dcb2c2e473774ba1b
-
SHA1
70bcf40ddc13cacfc554f364018323b66249c3cf
-
SHA256
f9998e92985eb9853c2ceefd042cf1c95b06d1ebfe4b2f7ec3dc157992fc5436
-
SHA512
51f34b571918271efdf63b6f05b53a2ad0a3a603f6ab238dc733b8094da36da84029de2f168e0992db71db5e7838cba0502ff0f9742f7e3b9a2cf2a7cf9aeb38
-
SSDEEP
384:jzH/9XLJYhxpmS9CJJCuuj2nBW33Dnk49REjy1pYzGG2nfOdr0lWe8u1UQ9N8j26:jrLYPwrCuu7d9RFb6oOd6xcXtmU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 008428563778dd6dcb2c2e473774ba1b
Files
-
008428563778dd6dcb2c2e473774ba1b.sys windows:5 windows x86 arch:x86
bdd73e1fe4fae4b6a8ad462168e4e957
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlAnsiStringToUnicodeString
MmIsAddressValid
ZwClose
ZwUnmapViewOfSection
ZwCreateFile
RtlInitUnicodeString
IoRegisterDriverReinitialization
KeDelayExecutionThread
ZwCreateKey
wcslen
swprintf
wcscat
wcscpy
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
strncmp
IoGetCurrentProcess
_wcsnicmp
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
PsGetVersion
_wcslwr
wcsncpy
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ