Static task
static1
General
-
Target
0002a1a497b83aeab842f6a4f7999c3d
-
Size
23KB
-
MD5
0002a1a497b83aeab842f6a4f7999c3d
-
SHA1
7665b2fa2d2ea3d30cfcf8993de245ff268a3b0f
-
SHA256
db1f4511dd8b4eac6a965a1b3a48b943420e951b5a51ee26b498ef4c0bab2835
-
SHA512
161d6141eac59527325afd5694f37224c4d7751707ca879f87101ab3317d242d97dcf1b4e11123522b2ca2a4ad8e2de360c68e93469322ba64a8db09b32c90ab
-
SSDEEP
384:uXKL1lPG58vPhLM2ozpPHxmBS4vGj+/DVgaBlTt1kGRBeIfOULxwkOr5QFQt:uXKL1lPC8vPh4zzpfxAS4vGj+/6aBlT+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0002a1a497b83aeab842f6a4f7999c3d
Files
-
0002a1a497b83aeab842f6a4f7999c3d.sys windows:5 windows x86 arch:x86
8bd9f17dfc17dcc76230df44115c38b9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
PsGetVersion
_wcslwr
wcsncpy
RtlInitUnicodeString
MmIsAddressValid
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
RtlAnsiStringToUnicodeString
ZwClose
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
ZwCreateFile
IoRegisterDriverReinitialization
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwUnmapViewOfSection
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
ZwCreateKey
wcscat
wcscpy
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 576B - Virtual size: 572B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ