Static task
static1
General
-
Target
0d88fcb606c78acf5117d514f1105da7
-
Size
22KB
-
MD5
0d88fcb606c78acf5117d514f1105da7
-
SHA1
778260309bef029422bf6c0233dd444cbf57ff5d
-
SHA256
788df1f0d19232f152b7206be19be71f59ba80c059add32f899f41ece309627b
-
SHA512
25f01491592eddcbbbeebbd4045b1599fbe844dcab625409d70dcd4392c77ddeffbed5e40036dac83c264ef124807eeda200ec057a1c701651e4c1e0a24926ae
-
SSDEEP
384:l5YvO/UCByTIYEAUgOLD2vohCIW0I5CAvb646udTx9GL+Pw2OopJ0nWQb923G:UvO/UCkTI7AUgOLD2vohCIW0cvb64ldJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d88fcb606c78acf5117d514f1105da7
Files
-
0d88fcb606c78acf5117d514f1105da7.sys windows:5 windows x86 arch:x86
459b74eea8772142d14fc138669dd472
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwCreateFile
RtlInitUnicodeString
IoRegisterDriverReinitialization
KeDelayExecutionThread
ZwCreateKey
wcslen
swprintf
wcscat
wcscpy
PsGetVersion
_wcslwr
wcsncpy
MmIsAddressValid
ZwUnmapViewOfSection
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
strncmp
IoGetCurrentProcess
_wcsnicmp
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlAnsiStringToUnicodeString
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 576B - Virtual size: 572B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ