Static task
static1
General
-
Target
16ca6588f4212033b7d7a45e4344bb29
-
Size
124KB
-
MD5
16ca6588f4212033b7d7a45e4344bb29
-
SHA1
895dc1193b1091a13d8d43223305ada5cffb944d
-
SHA256
7e2ab31f1b2c8eef40c38d35562f21dfec1cef1b04f8f56e02a48ba7dc77f645
-
SHA512
95d13a63a00346c61577032d336634293613f3897d4bfb0bde06fa0a2afcf51d9e73fdd87cf8f19617b4ce5b479d7a29429bcff8da795aa4ff6b15dc6a375a46
-
SSDEEP
3072:aEHIRcNO1XYwiTrZgEsy9ZxpnvG7pquXIlXAWccM3zu:bHIRcMRYw0eEDZpepqugpc13zu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16ca6588f4212033b7d7a45e4344bb29
Files
-
16ca6588f4212033b7d7a45e4344bb29.sys windows:5 windows x86 arch:x86
78d1c146fcb33f0b02c4c6a578f70636
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeInitializeSpinLock
RtlFreeAnsiString
RtlFreeUnicodeString
IoDeleteDevice
sprintf
KeSetEvent
PsCreateSystemThread
RtlUnicodeStringToAnsiString
ZwClose
IoCreateDevice
KeQuerySystemTime
strncpy
strncmp
strstr
MmIsAddressValid
IoUnregisterFsRegistrationChange
IoRegisterFsRegistrationChange
IoAllocateMdl
ExAllocatePoolWithTag
ExFreePoolWithTag
ExGetPreviousMode
wcsncpy
RtlInitAnsiString
wcsncat
IoFreeMdl
IoDriverObjectType
MmProbeAndLockPages
MmUnlockPages
ObReferenceObjectByName
KeDelayExecutionThread
ZwReadFile
ZwCreateFile
ZwQueryInformationFile
ZwWriteFile
ExAllocatePool
ExFreePool
isupper
ZwQuerySystemInformation
KeWaitForSingleObject
tolower
ZwQueryDirectoryFile
ZwDeleteFile
ZwOpenFile
isdigit
ZwQueryDirectoryObject
_wcsicmp
RtlCompareUnicodeString
MmMapLockedPages
ZwOpenDirectoryObject
ZwQueryValueKey
KeServiceDescriptorTable
ZwLoadDriver
ZwEnumerateKey
ZwOpenKey
ZwCreateKey
ZwDeleteValueKey
ZwSetValueKey
ZwEnumerateValueKey
strchr
RtlInitUnicodeString
RtlTimeToTimeFields
KeInitializeEvent
PsTerminateSystemThread
KeTickCount
ZwFlushKey
ZwDeleteKey
KeInitializeSemaphore
KeReleaseSemaphore
KeReadStateSemaphore
toupper
isspace
ObReferenceObjectByHandle
RtlAnsiStringToUnicodeString
RtlImageDirectoryEntryToData
IofCompleteRequest
memcpy
memset
_except_handler3
_allrem
hal
KeGetCurrentIrql
KfRaiseIrql
KfLowerIrql
Sections
'4?WA\yZ Size: - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Q1ve<T8y Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
P_vs%elh Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
h,h"'h)u Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yk=dA#vX Size: - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
]p]=fGt( Size: - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RP1I]x1; Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
(!r?yT0d Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ