Static task
static1
General
-
Target
1f10b83bcd0589b7fb7e625d5382c443
-
Size
50KB
-
MD5
1f10b83bcd0589b7fb7e625d5382c443
-
SHA1
53c6b9f11962daed7fd2cfaf0b0c6e112815b4a5
-
SHA256
444e7d59948e3a598d3dbb5bcb48564a6aa99fd2a63e14b680fde7b4b7d08165
-
SHA512
6076847df1f6a0a95a241ffdec3635ee39bef9965c59c715b48e9ca9ea9e33a4b48cc9cc3ed07b55f2f3af1895db2730f3bff4346a64f0a1ebde0b16bd561a12
-
SSDEEP
768:4ljIopNileyxQcrW8mHPYJn9vii/NDqnSCz5LDZqGbtqQ6hB7OHPP5/3+65ld3kf:CIovxeKKuRH6Da
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1f10b83bcd0589b7fb7e625d5382c443
Files
-
1f10b83bcd0589b7fb7e625d5382c443.sys windows:4 windows x86 arch:x86
d2de9afe25a222462f10546f9e7fb927
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ExFreePool
wcscpy
ZwEnumerateKey
wcscat
ExAllocatePoolWithTag
ZwOpenKey
RtlInitUnicodeString
KeDelayExecutionThread
strncmp
IoGetCurrentProcess
PsGetVersion
strncpy
_strnicmp
MmGetSystemRoutineAddress
wcsncmp
wcslen
towlower
PsCreateSystemThread
ZwSetValueKey
ZwQueryValueKey
_except_handler3
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ZwQueryInformationFile
ZwCreateFile
ZwDeleteValueKey
IoRegisterDriverReinitialization
IofCompleteRequest
wcsstr
RtlCopyUnicodeString
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
ExGetPreviousMode
_wcsnicmp
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 224B - Virtual size: 197B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 992B - Virtual size: 982B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ