Static task
static1
General
-
Target
0d853715d1e8844a749a2b2ebbaaed6e
-
Size
47KB
-
MD5
0d853715d1e8844a749a2b2ebbaaed6e
-
SHA1
c4b8eec28c7c9dead146d0201d50249f160c95e2
-
SHA256
f8751d93438a02c8fc85a37fc3d458d2aa8e334377b1caf4148025dfd2c03344
-
SHA512
04c19c26b1678f2092a1e87ee5e8d3b63a455f994844159995fe8c5a7ce526df3be02812e266b67f4b3b715732f80ae2c6d8c94eeae9a2691dc8c63232fe3158
-
SSDEEP
768:qsiV9UD8h06+Vv3LXLLkzngP/Yc4WUqi/NRHXAC1:nllU1SC1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d853715d1e8844a749a2b2ebbaaed6e
Files
-
0d853715d1e8844a749a2b2ebbaaed6e.sys windows:4 windows x86 arch:x86
f0c8951f7a2a5ac3692f5f6e19f5c1c5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitUnicodeString
wcscat
wcscpy
ZwClose
ZwCreateFile
IoRegisterDriverReinitialization
swprintf
PsTerminateSystemThread
KeDelayExecutionThread
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
MmIsAddressValid
ZwUnmapViewOfSection
PsGetVersion
_wcslwr
wcsncpy
ZwCreateKey
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
RtlAnsiStringToUnicodeString
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 224B - Virtual size: 195B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 864B - Virtual size: 834B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 928B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 736B - Virtual size: 716B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ