Static task
static1
General
-
Target
00fe397b790edcec7ec457f27aaa9ad9
-
Size
23KB
-
MD5
00fe397b790edcec7ec457f27aaa9ad9
-
SHA1
2a0a18cf8f7f8aac1ece45ab666bcda2dbbf5521
-
SHA256
2582cca0e8b66c325bd905a2c965dcf648f081d2fa863b652f89e3746656943f
-
SHA512
d391f7b7f80944706b01a34453d049798681ddfeaaa8e9ba2a74eecd0bec1a57ab892994ecfaba94599a6f28c029729231b2c9b6531b208cb5a5a5c6e965a3cb
-
SSDEEP
384:LVZVZy73lqYgXQGhcsn2ld4PAlGn/tdw0RN1kc7q2lz+7/cvbiCPc2yVIJXf+17O:LVEgtAQnlPdn1Wjc7lzRPDtILDDjDoKQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00fe397b790edcec7ec457f27aaa9ad9
Files
-
00fe397b790edcec7ec457f27aaa9ad9.sys windows:5 windows x86 arch:x86
d3034024b0581340edb4eb985f03d4d0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwCreateFile
ZwSetValueKey
ZwClose
ZwOpenKey
ZwEnumerateKey
RtlInitUnicodeString
IoRegisterDriverReinitialization
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
MmIsAddressValid
ZwUnmapViewOfSection
RtlFreeUnicodeString
wcslen
ZwCreateKey
wcscat
wcscpy
PsGetVersion
_wcslwr
wcsncpy
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlAnsiStringToUnicodeString
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
strncmp
IoGetCurrentProcess
_wcsnicmp
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 992B - Virtual size: 986B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ