Static task
static1
General
-
Target
205c73d77518d580fbfbe4add6373602
-
Size
47KB
-
MD5
205c73d77518d580fbfbe4add6373602
-
SHA1
1dfcb434ab72b18a5f5b7d63c097ad98ced97327
-
SHA256
8d5396cf8e35126a865ef7c5b9d5e02022ee6c5a4aec0f76c977d8b4690534d5
-
SHA512
7fee5976d151461ec7f0024f314a421d0ce52d0955e1a04f854d25f4f927d296320718d247b9d3750f32dd7df9c6fa902795796c71391eaf7c4010e6e91dae44
-
SSDEEP
768:lFggCnJ0ELOXMM2LAULCHHvqK/DgHMLsEQ0kUymi05jsQE0GqSMddQp:l+nZCfHiE6NsQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 205c73d77518d580fbfbe4add6373602
Files
-
205c73d77518d580fbfbe4add6373602.sys windows:4 windows x86 arch:x86
ad79abe56c7b48b15db0d2689c839b9a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeDelayExecutionThread
ZwClose
ZwCreateKey
wcslen
swprintf
RtlInitUnicodeString
wcscat
wcscpy
MmIsAddressValid
ZwUnmapViewOfSection
PsGetVersion
_wcslwr
wcsncpy
ZwCreateFile
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
strncmp
IoGetCurrentProcess
_wcsnicmp
MmGetSystemRoutineAddress
PsSetCreateProcessNotifyRoutine
IoRegisterDriverReinitialization
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
RtlAnsiStringToUnicodeString
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 900B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 736B - Virtual size: 714B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ