Static task
static1
General
-
Target
040f7b5595960776de609c3762530f60
-
Size
23KB
-
MD5
040f7b5595960776de609c3762530f60
-
SHA1
c62a3ef3e781bf2fb3c1f57285c95e1bcf112779
-
SHA256
abfbf948e4214bf16d216894b274c37cbbe6043edc715e7bbeab9f8e62fc59f7
-
SHA512
b91ce3452bd0e0b40cae18d9f5d76b616951e50022693a5f5ca325308cfe7e57e029aa8489b8e6eff74e13285ff68b0ee086ce0b2df0dccb46a8718190f5d905
-
SSDEEP
384:08EFBVCPdX5HkuhkptpdQt1//qVpQtdivrYI5DKW+LgqwO/O2N:08EFqPN5HkuhL//qVKtdocItKW+Llwx2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 040f7b5595960776de609c3762530f60
Files
-
040f7b5595960776de609c3762530f60.sys windows:5 windows x86 arch:x86
2f237da37a1c511994d17c965a758365
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
ZwClose
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
ZwCreateKey
wcslen
wcscat
wcscpy
ZwCreateFile
IoRegisterDriverReinitialization
MmIsAddressValid
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlAnsiStringToUnicodeString
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
strncmp
IoGetCurrentProcess
_wcsnicmp
PsGetVersion
_wcslwr
wcsncpy
ZwUnmapViewOfSection
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 576B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ