Static task
static1
General
-
Target
002dc84a1d325ff80538c9a06beb6ebb
-
Size
47KB
-
MD5
002dc84a1d325ff80538c9a06beb6ebb
-
SHA1
491d1207f91f2e5478f282704444ecdb54d5da02
-
SHA256
c43e894b1735d5b2840a90ff9c64713c6697622fe117afef82b4742d30a63892
-
SHA512
f4b76d95ccf4cbb67e7c90e825226c0d8b85a303efc35edb16f40c679ce18727e8ae8d231a00074058e46daa58776e6643b072757f6e836778da0c3ad318b031
-
SSDEEP
384:soFkB731ISFYGb9LPXYDridmlPYx7s9cyIRfb7RtgT6dtW2jA/f5p4fcjzWeQLij:KoS3ze2V5WZPaJt0h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 002dc84a1d325ff80538c9a06beb6ebb
Files
-
002dc84a1d325ff80538c9a06beb6ebb.sys windows:4 windows x86 arch:x86
9d7b751199325169024562daef0edc86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwCreateFile
ZwSetValueKey
ZwClose
ZwOpenKey
ZwEnumerateKey
KeDelayExecutionThread
ZwCreateKey
wcslen
swprintf
RtlInitUnicodeString
wcscat
wcscpy
RtlAnsiStringToUnicodeString
PsSetCreateProcessNotifyRoutine
MmGetSystemRoutineAddress
strncmp
IoGetCurrentProcess
_wcsnicmp
MmIsAddressValid
PsGetVersion
_wcslwr
wcsncpy
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
IoRegisterDriverReinitialization
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwUnmapViewOfSection
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 900B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 704B - Virtual size: 698B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ