Static task
static1
General
-
Target
02adbcf700e25658e7c515b309a8ee41
-
Size
2KB
-
MD5
02adbcf700e25658e7c515b309a8ee41
-
SHA1
0252fe7d80c8ea6cb8681a90e285892ee94b67f9
-
SHA256
1c12fe1e310a2a05b27751399a7cd759f32b668cae860c207a3dde71626f1c7e
-
SHA512
b48712759589f4e4b81ba973e9475237ac3a2aa12f9d220ad1bbf6da4dc6b1cafbb4984abefad5caf847b15b8aa2a7d7d3a0657ccded392bd4f025c4d1c085cf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02adbcf700e25658e7c515b309a8ee41
Files
-
02adbcf700e25658e7c515b309a8ee41.sys windows:5 windows x86 arch:x86
f0a91887f71b7a97e15b01958317dccc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
MmUnmapIoSpace
MmMapIoSpace
MmGetPhysicalAddress
KeServiceDescriptorTable
KeSetEvent
KeDelayExecutionThread
memmove
KeWaitForSingleObject
RtlFreeAnsiString
_stricmp
ObfDereferenceObject
RtlUnicodeStringToAnsiString
ObReferenceObjectByHandle
IofCompleteRequest
KeInitializeEvent
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 896B - Virtual size: 891B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 288B - Virtual size: 258B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 576B - Virtual size: 564B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 160B - Virtual size: 154B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ