Static task
static1
General
-
Target
0d3baa4d39fa03b448fea6e464684a4a
-
Size
24KB
-
MD5
0d3baa4d39fa03b448fea6e464684a4a
-
SHA1
8e0b35927e1c81498854683fe4726c969648aef8
-
SHA256
974f3b317cb6eac34b097cdcc4ffdbd86f8b85e8359ed77fd83631a30b8ec4ed
-
SHA512
5d23dfb7be512faded86ffa54a219e7bb458bd599f0bcf6054b7b9c3f5597cfa577b395dd95aa76d6159ef95a5ec6892f138b0405f19513611bea36e2292b07b
-
SSDEEP
384:c3pfBsw4v+VB2e90sKyIMI0axFEReXDblVsZaCYaGa7t5yuSS3kU:+fBb4v+VB2qZKyId0awReXDblVIjHt7q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d3baa4d39fa03b448fea6e464684a4a
Files
-
0d3baa4d39fa03b448fea6e464684a4a.sys windows:5 windows x86 arch:x86
b32f59566e8c20ead0e48e16f9f7ab29
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwCreateFile
ZwSetValueKey
ZwClose
ZwOpenKey
ZwEnumerateKey
RtlAnsiStringToUnicodeString
MmIsAddressValid
RtlInitUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwUnmapViewOfSection
PsGetVersion
_wcslwr
wcsncpy
IoRegisterDriverReinitialization
ZwCreateKey
wcscat
wcscpy
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 192B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 586B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ