Static task
static1
General
-
Target
0436a955f449a5b53f052dfe73bf1331
-
Size
23KB
-
MD5
0436a955f449a5b53f052dfe73bf1331
-
SHA1
96122c6dce3f308046666940b05673f2869e7333
-
SHA256
9c07d07f82124abcbaf215e4c6661065b55931ae00bc5876d157f7c11225bc3f
-
SHA512
6c1402a50b5ad8b1c3fef2cda7452e7905bd06bf3f37eb5ca201ad29bdffa477147ea29e91f45f2fdef26124c28ddc2916568253dba3041f68d4a46106d44bff
-
SSDEEP
384:18Y5eoMRG/8Q/kStyTX/ZvVJnq1OCY/pGUYzDjFT9BSI0CXOYahmhd:KgeoMRG/N/kSwTX/ZvVdGlY/pGUYz/F1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0436a955f449a5b53f052dfe73bf1331
Files
-
0436a955f449a5b53f052dfe73bf1331.sys windows:5 windows x86 arch:x86
ee86b4ae453f52d8ace62ff7ecb7c269
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwCreateFile
ZwSetValueKey
ZwClose
ZwOpenKey
ZwEnumerateKey
MmIsAddressValid
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlInitUnicodeString
IoRegisterDriverReinitialization
ZwUnmapViewOfSection
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
PsGetVersion
_wcslwr
wcsncpy
RtlAnsiStringToUnicodeString
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
ZwCreateKey
wcscat
wcscpy
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 608B - Virtual size: 582B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ