Static task
static1
General
-
Target
07fdcb92223d1c3f939644b60125a563
-
Size
22KB
-
MD5
07fdcb92223d1c3f939644b60125a563
-
SHA1
7ce6d7a781314e6686308beed9342a03478a28ab
-
SHA256
a83f36cc113a4b4bb19660c673b2df6a096ddc2e3f4059a50d2022f7eb4a4374
-
SHA512
cf6845c98e184d84bcfbdd311d18921fddd7dc31cc35404d70bbdabc15276b847e4d19a6c7d0cf2a95c6b56b31a8b24333cdf5a359b428afb85cc4bad563958a
-
SSDEEP
384:62O3h3361gM2hN9A71ePwj5ff/MwLJp0fAsn0L8Mcl0gEQ6Zrg4rSZFmTq2w:+xH+bf/O9TFHur5w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07fdcb92223d1c3f939644b60125a563
Files
-
07fdcb92223d1c3f939644b60125a563.sys windows:5 windows x86 arch:x86
1f3c93612e9658e7b2dff0bd13cea4c7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
ZwClose
ZwCreateFile
RtlInitUnicodeString
IoRegisterDriverReinitialization
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
MmIsAddressValid
ZwUnmapViewOfSection
RtlFreeUnicodeString
KeDelayExecutionThread
ZwCreateKey
swprintf
wcscat
wcscpy
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
PsGetVersion
_wcslwr
wcsncpy
RtlAnsiStringToUnicodeString
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 992B - Virtual size: 986B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ