Static task
static1
General
-
Target
0bbe4b26f87b614100227463b49f9556
-
Size
27KB
-
MD5
0bbe4b26f87b614100227463b49f9556
-
SHA1
973e8e41fc31708c754bfdeed314fb6d274fef51
-
SHA256
54c41308ad9d04aa78b64577210a481833e3a7de521c46fabd6f56554694025d
-
SHA512
422a902abaf5564cfd5912d23a0bf22943f7d88d48d46f5e3e3e5cd55857f6698f8ac5c529cc103495e687e149390979f44db2ffa02bd6f30315dadefd70ea12
-
SSDEEP
768:UySbJ9x6qoPbJcvBySfau5IGCLzYpgyT:gbrx6qoPts8Sfh8byT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0bbe4b26f87b614100227463b49f9556
Files
-
0bbe4b26f87b614100227463b49f9556.sys windows:4 windows x86 arch:x86
a15319d8845f581ea9ed71d06ed3de30
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_stricmp
RtlInitUnicodeString
IofCompleteRequest
KeServiceDescriptorTable
ZwClose
ZwUnmapViewOfSection
strncmp
IoGetCurrentProcess
MmIsAddressValid
ExFreePool
_snprintf
ExAllocatePoolWithTag
ZwQuerySystemInformation
_wcsnicmp
wcslen
swprintf
RtlCopyUnicodeString
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlAnsiStringToUnicodeString
wcscat
wcscpy
strncpy
ObfDereferenceObject
ObQueryNameString
RtlCompareUnicodeString
ExGetPreviousMode
_except_handler3
MmGetSystemRoutineAddress
_strnicmp
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 756B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ