Static task
static1
General
-
Target
0a147fc037c2e1e9f682fe04b6bc4b0c
-
Size
47KB
-
MD5
0a147fc037c2e1e9f682fe04b6bc4b0c
-
SHA1
dbdba19401b53834a198926df93be5114e0f62f8
-
SHA256
7b81ca5c4336cece425f613e6c2cc41faed8bdfd4ce42857b980dc4449109afc
-
SHA512
fd5321fd6aa1a569a6c76979634c523a888ed83c5f6ab9132326a57007ac0b1e672a1eafb1bf2ac2ef34bdd098ace2927902b964f8aa6f7ec71f32e15cdc7d71
-
SSDEEP
768:FGS/8j1eG7iJqmeq/K+IybK6xkLYce5lhLeLJG/c8hwyShge3Gn66AvO20ra:wa0iVBCW9d16cIOf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a147fc037c2e1e9f682fe04b6bc4b0c
Files
-
0a147fc037c2e1e9f682fe04b6bc4b0c.sys windows:4 windows x86 arch:x86
157367b162d99518b60aa3142e823161
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitUnicodeString
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwClose
ZwCreateSection
ZwCreateFile
KeDelayExecutionThread
ZwCreateKey
wcslen
swprintf
wcscat
wcscpy
IoRegisterDriverReinitialization
MmIsAddressValid
PsSetCreateProcessNotifyRoutine
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
RtlAnsiStringToUnicodeString
ZwUnmapViewOfSection
strncmp
IoGetCurrentProcess
_wcsnicmp
PsGetVersion
_wcslwr
wcsncpy
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 192B - Virtual size: 173B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 928B - Virtual size: 900B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 736B - Virtual size: 718B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ