Static task
static1
General
-
Target
00e25ebd35ca243d11bdf85e846eab38
-
Size
23KB
-
MD5
00e25ebd35ca243d11bdf85e846eab38
-
SHA1
949efc92fe5d1151bcdb53b014013aacf71d48f4
-
SHA256
3ef45b1703ed8401f1271ea31d238c0923c29e9deffbd155ed743b6d88375f31
-
SHA512
1ed843d265c41261a0c104dd2adb9426413d0d7d32ee2c93578aab92f89248a5bc928f18cbcfb0ce4128654001edc445fb1eb174d8e5d5c8458d5cf5520d8718
-
SSDEEP
384:GvpAju7RN5JqQNTA1snIIRdGGx+PTAWZ+oEpXUJh3bjTwrAD7Uc0sjdoYwxlQqP:6ZNN3ICHxWTAw+oEar8rENqygI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00e25ebd35ca243d11bdf85e846eab38
Files
-
00e25ebd35ca243d11bdf85e846eab38.sys windows:5 windows x86 arch:x86
8db805c86750d40dba4c64cb7d65d4e7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
RtlInitUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
PsGetVersion
_wcslwr
wcsncpy
MmIsAddressValid
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwCreateKey
wcslen
wcscat
wcscpy
RtlAnsiStringToUnicodeString
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwUnmapViewOfSection
ZwCreateFile
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
IoRegisterDriverReinitialization
strncmp
IoGetCurrentProcess
_wcsnicmp
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 608B - Virtual size: 594B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ