Static task
static1
General
-
Target
0e35c64c7f19d14fc96099b4cde001f7
-
Size
21KB
-
MD5
0e35c64c7f19d14fc96099b4cde001f7
-
SHA1
b22021873b7b28af6b178d86e3e20b5625dffa35
-
SHA256
827fc043671f62ebe1ec478eea0850acc89d8ec302bfb3a64cdb37b85956d409
-
SHA512
6929f575892502511410be7d511d515e07f2696e7e556a578c1856a51e7643e3d5ddb7b59e039373e1c918608424765e33dca264ce817f86b668b7a0db32fa28
-
SSDEEP
384:kdkyxfrIUPo6RcsOvsbY5jNzveYgbPPM3qzv8fgxLlvhWiplD:wTxfcUNfOvyY5jNzveYcHmmv8fgxLlvx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e35c64c7f19d14fc96099b4cde001f7
Files
-
0e35c64c7f19d14fc96099b4cde001f7.sys windows:5 windows x86 arch:x86
2d1c3e331dd6e59b9d2b770609b37287
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeDelayExecutionThread
ZwClose
ZwCreateKey
wcslen
swprintf
RtlInitUnicodeString
wcscat
wcscpy
ZwCreateFile
IoRegisterDriverReinitialization
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
PsGetVersion
_wcslwr
wcsncpy
MmIsAddressValid
ZwUnmapViewOfSection
strncmp
IoGetCurrentProcess
_wcsnicmp
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
RtlAnsiStringToUnicodeString
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 628B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ