Static task
static1
General
-
Target
0bece63e840b6582317c4b7904420a9c
-
Size
49KB
-
MD5
0bece63e840b6582317c4b7904420a9c
-
SHA1
caaaf99d9d0a138857289f6d2a3c94106417ce50
-
SHA256
25e3f9b10ce227e999f9cbcc7e4ef0e4e50d3101e8ed950f118e8a4d36a952b2
-
SHA512
435a5b34a9c2b1f00e657c6b91047dd22f4e0aa49811f3e56826a57eb8782f4d5fc8a670265f1ecba4eca6553f601d84fef15034a8432ca7d36b66ba7c7aa384
-
SSDEEP
768:yaQBj517wcCEVSZqubiqKapGuduL4uRzVp:yh5X7wnBPGuUhRz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bece63e840b6582317c4b7904420a9c
Files
-
0bece63e840b6582317c4b7904420a9c.sys windows:4 windows x86 arch:x86
ce67b4f80869c018e04ea66345897ee0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
RtlInitUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
wcscat
wcscpy
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
MmIsAddressValid
swprintf
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
MmGetSystemRoutineAddress
PsSetCreateProcessNotifyRoutine
PsGetVersion
_wcslwr
wcsncpy
ZwUnmapViewOfSection
RtlAnsiStringToUnicodeString
ZwCreateKey
wcslen
IoRegisterDriverReinitialization
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
strncmp
IoGetCurrentProcess
_wcsnicmp
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 900B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 736B - Virtual size: 722B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ