Static task
static1
General
-
Target
02b00f8d5982e2ddd808a7f34f5d001b
-
Size
22KB
-
MD5
02b00f8d5982e2ddd808a7f34f5d001b
-
SHA1
b858d257b12ccd4188a577a09cc3ce89b077616b
-
SHA256
4afd0785db2f2da9faee88ae77a7ef30530cb51d670aa78d8c7e6e18854c7580
-
SHA512
3869ee360b3f6a78b47a0cca4ae35f0e5204f8b3639a6e4a5f019236e7912814b1b3ae26f34f81205849addf2ea1c95bff862d8ed94d1a120741594af5b3d490
-
SSDEEP
384:Zl9cRyGdVvUWOu45ffQoza4usQ/4OTz2EfTevRx+QMYhVEUcLQWQdO7Pe/qVs990:ZEdqWU24u/4c+x+QM+R+GH0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02b00f8d5982e2ddd808a7f34f5d001b
Files
-
02b00f8d5982e2ddd808a7f34f5d001b.sys windows:5 windows x86 arch:x86
480e5d0ee235f4475088d84ae22e771e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwClose
ZwCreateSection
ZwOpenFile
RtlInitUnicodeString
PsGetVersion
_wcslwr
wcsncpy
KeDelayExecutionThread
ZwCreateKey
wcslen
swprintf
wcscat
wcscpy
ZwCreateFile
IoRegisterDriverReinitialization
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
MmIsAddressValid
ZwUnmapViewOfSection
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
strncmp
IoGetCurrentProcess
_wcsnicmp
RtlAnsiStringToUnicodeString
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 608B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ