Static task
static1
General
-
Target
00b84b8db26c0a5b8a4708e9e12a7739
-
Size
23KB
-
MD5
00b84b8db26c0a5b8a4708e9e12a7739
-
SHA1
162077e5130b53914fb817f4d2dd83fabb7a075b
-
SHA256
e8e42b1a58e6eed343f74c250e513d8605cf3d80ec0dbfa866446c1f35c7376b
-
SHA512
ac6a982c10fd76e851e23deb0d933f0115aa91f59231bdd9c1d8b3b7d2b50b548de577ca421d1e8a9011106a7d1139d60f4b34cab08661767f27866cccb5e7be
-
SSDEEP
384:UbU2vhCtKZhUGNOvMnPMTwPsctqN4d9vmT+Q/GscRz1JDsS2YoC6v:UbU2vhXZhUG4vKLPs8qN4d9vmbcRz1JU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00b84b8db26c0a5b8a4708e9e12a7739
Files
-
00b84b8db26c0a5b8a4708e9e12a7739.sys windows:5 windows x86 arch:x86
d3acab771fe7b125309a57af53a15bb3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
ZwClose
RtlInitUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
ZwCreateFile
IoRegisterDriverReinitialization
MmIsAddressValid
ZwUnmapViewOfSection
RtlAnsiStringToUnicodeString
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
PsGetVersion
_wcslwr
wcsncpy
ZwCreateKey
wcscat
wcscpy
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 192B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 576B - Virtual size: 572B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ