Static task
static1
General
-
Target
02b6aa51d00693ca243c29699383488b
-
Size
4KB
-
MD5
02b6aa51d00693ca243c29699383488b
-
SHA1
61f8b024752c105f5e2ffe29089e801396c8ca3b
-
SHA256
12fe6f81cd1c987f346acc49c8596b237af2323ca460367aed941c522cc3db32
-
SHA512
51f20a57c83b7715e2ba0ed27f3acc440b5319d46a724465fb9db221474a2ac76f40fdfac0231f8ae82273092b10496dacefd48afe454e0c95b21c0d41830a5d
-
SSDEEP
96:vuhfadk24GXAHmJROBkqrsUsV7IHbn6U5zX5um5zomdXzgxg:PK2+Gb0kCpsV766Bmdg+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02b6aa51d00693ca243c29699383488b
Files
-
02b6aa51d00693ca243c29699383488b.sys windows:4 windows x86 arch:x86
a101d104c7909d329a19b9d7f0f89a5e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoGetDeviceObjectPointer
ObDereferenceObject
ObReferenceObjectByName
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwClose
ZwEnumerateValueKey
IoGetCurrentProcess
ZwQueryDirectoryFile
ZwQuerySystemInformation
ZwSetValueKey
ZwTerminateProcess
ZwYieldExecution
KeServiceDescriptorTable
IoDriverObjectType
IoCallDriver
ZwOpenKey
IoBuildDeviceIoControlRequest
ndis.sys
NdisRegisterProtocol
NdisDeregisterProtocol
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 624B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 320B - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ