Static task
static1
General
-
Target
0ff54fd5289c1e14006d98804ba7633c
-
Size
23KB
-
MD5
0ff54fd5289c1e14006d98804ba7633c
-
SHA1
febb588b4b6ca67b14826ec08fc5a865cf32d34f
-
SHA256
fd7b7b530de23d89d2ab1abaa1f5e18d2934aa1db5e22b0c38dcf5a4a0833e4c
-
SHA512
01db71de7309bfd4393d9000799df026681c2964b87efb5c7ee2e15ad1bbae92b0a22e085366ffee3d5712c3a026e34997b8ae5621a0d0bd3acd213bae3a43ae
-
SSDEEP
384:PudrrvUGT7o545keixEjbVyniDRww30b/EvpsVfuIFQ77HoQIJ1GAa8Qf9GPxcrq:PuVvUGAG5kVxGbVyiqQ3IF87HzMYlvAJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ff54fd5289c1e14006d98804ba7633c
Files
-
0ff54fd5289c1e14006d98804ba7633c.sys windows:5 windows x86 arch:x86
7e656bcddfb2e73438814d13c56de58a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
PsGetVersion
_wcslwr
wcsncpy
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwClose
ZwCreateSection
ZwOpenFile
RtlInitUnicodeString
RtlAnsiStringToUnicodeString
ZwCreateFile
ZwEnumerateKey
ZwSetValueKey
ZwOpenKey
IoRegisterDriverReinitialization
KeDelayExecutionThread
ZwCreateKey
wcslen
swprintf
wcscat
wcscpy
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
MmIsAddressValid
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
strncmp
IoGetCurrentProcess
_wcsnicmp
ZwUnmapViewOfSection
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 608B - Virtual size: 586B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ