Static task
static1
General
-
Target
0c2a92569d8d1894502439fa14e2b227
-
Size
41KB
-
MD5
0c2a92569d8d1894502439fa14e2b227
-
SHA1
1237d2274843a9ec49daffe117ac57b11b3920b5
-
SHA256
4971bd1375c1deebf7f7a6f2deb7ada82f736095c3079bc183ce44d07e905bc8
-
SHA512
1664d09479977a558e31d549a564421329610092df888bf66d2e13736d044e30f72e0404a1d44192f0614c7a63cc8aee6e3638c2802d03b3463cd42ab8ecdf45
-
SSDEEP
768:UG6g3cgxgl/OMgzTg7vmcHgwt6iZXtRYlmEmNtzmgilw9CK+k/Qjx2iRaFn+b:UG6ScgImpWvmyFtNZLYMEwtCgoocjHaM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c2a92569d8d1894502439fa14e2b227
Files
-
0c2a92569d8d1894502439fa14e2b227.sys windows:4 windows x86 arch:x86
e32e03cf536838f09b30a0cf0564f3cc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeDelayExecutionThread
KeQuerySystemTime
swprintf
RtlInitUnicodeString
RtlCompareUnicodeString
_wcsnicmp
wcslen
ZwClose
ZwSetValueKey
ZwQueryValueKey
ZwOpenKey
_except_handler3
ZwCreateKey
wcsncpy
wcsrchr
ZwCreateFile
ObReferenceObjectByHandle
MmGetSystemRoutineAddress
ExFreePool
_snprintf
ExAllocatePoolWithTag
_wcsicmp
KeTickCount
KeQueryTimeIncrement
_stricmp
_snwprintf
ZwDeleteKey
RtlAnsiStringToUnicodeString
ZwSetInformationFile
wcscpy
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ObfDereferenceObject
MmIsAddressValid
PsSetCreateProcessNotifyRoutine
wcsstr
_wcslwr
strncmp
IoGetCurrentProcess
PsCreateSystemThread
strncpy
PsLookupProcessByProcessId
wcschr
IoDeviceObjectType
RtlCopyUnicodeString
PsGetVersion
wcscat
IofCompleteRequest
IoRegisterDriverReinitialization
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 69B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ