Static task
static1
General
-
Target
1e8c6ab28959f64702ee32acaa25dcea
-
Size
9KB
-
MD5
1e8c6ab28959f64702ee32acaa25dcea
-
SHA1
00c7d3003427b5fa2efc7562b2fd5e4a03a4f441
-
SHA256
18d2ceaa1a36042325a544c6fc4889d5fea228f0e95785bb029c0dd1b20e0683
-
SHA512
b644795f2df707fa777cbbe1a91f7a396847b1214781274904df2a84b98afc65211e86e78de6335fdfa766d71cdeb8fdcc439a8dc5032c76c374db1aa51cd6aa
-
SSDEEP
192:TRohTkKgybugqJ4DLaHTMf+4I7Zo0tLEjs3Cm:OhLbug1XJm4Wn1
Malware Config
Signatures
Files
-
1e8c6ab28959f64702ee32acaa25dcea.sys windows:5 windows x86 arch:x86
b7a9ada452380dbef2c10f17db0ca25c
Code Sign
09:35:77:6f:cd:60:c4:8a:43:24:39:26:7b:b7:44:bcCertificate
IssuerCN=VeriSign Class 3 Code Signing 2004 CANot Before14-02-2012 08:40Not After31-12-2039 23:59SubjectCN=Tencent Technology(Shenzhen) Company LimitedSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
_except_handler3
IoCreateFile
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
IofCallDriver
KeGetCurrentThread
KeInitializeEvent
ObfDereferenceObject
IoAllocateIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
MmGetSystemRoutineAddress
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
IofCompleteRequest
ZwClose
KeServiceDescriptorTable
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
wcslen
hal
KeGetCurrentIrql
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 890B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ