Static task
static1
General
-
Target
14401da0c6a468c1a51e195d357d6ad3
-
Size
8KB
-
MD5
14401da0c6a468c1a51e195d357d6ad3
-
SHA1
a03c266944c46e8b2a029685ad36211bb0fd75ad
-
SHA256
e61dd9b42a0bdb9cdee4afbcb961ef136c80648ef5c07ef55d49792380c96266
-
SHA512
4ee7df4c1149e79f1c1780769e7856b7eaf73169141f1a27657a30036cde4b75e44788c6e0a3f5dc797d4252128f22b768f4cae054a53d3a66c29dcb9331bc8b
-
SSDEEP
192:yTkK2Xur2yNaZSFSSXixWcYoMs1/xm+Gqz4rIP+VhO/3qn5Xx7Qr1r4c8:yTkKvrBNYW1eGa4eex
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14401da0c6a468c1a51e195d357d6ad3
Files
-
14401da0c6a468c1a51e195d357d6ad3.sys windows:4 windows x86 arch:x86
37d7d43d8af67d691484420536d9ce54
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ndis.sys
NdisGetCurrentSystemTime
NdisRegisterProtocol
ntoskrnl.exe
RtlInitUnicodeString
IoCreateDevice
IoCreateSymbolicLink
IofCompleteRequest
KeServiceDescriptorTable
MmIsAddressValid
IoGetCurrentProcess
PsLookupProcessByProcessId
ObDereferenceObject
IoGetDeviceObjectPointer
IoBuildDeviceIoControlRequest
PsGetCurrentProcessId
IoCreateFile
IofCallDriver
ZwAllocateVirtualMemory
RtlCompareUnicodeString
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 336B - Virtual size: 332B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 608B - Virtual size: 594B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 688B - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ