Static task
static1
General
-
Target
1711b236d98a3fd277c083d6c499466b
-
Size
43KB
-
MD5
1711b236d98a3fd277c083d6c499466b
-
SHA1
f17d4d86823e059a7c13dce8e1e8eccf4b02b1b2
-
SHA256
dbfd940b62d840a9c81fe0c57535b7be0896a9a5eda3ed6a973984bbe461ee15
-
SHA512
c31fb016f1cea6616800bf26f32b17f8f1a79b0a6b45a259747778cd48b463e08f487a3c08897e02741d52f40ac2d5a78efabe685336ed3dd933021fd419898c
-
SSDEEP
384:3440z2NTDNdYkqNVc3REOlFJLTM+U6m0TG8DXuDCqRkntolzWGyK0cR0KTeVgmTw:x4iFY+1G8K5WXcCGhRFLU2378mjpr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1711b236d98a3fd277c083d6c499466b
Files
-
1711b236d98a3fd277c083d6c499466b.sys windows:4 windows x86 arch:x86
005b9ec0ffe7f5d7349d714c73f2dd28
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmIsAddressValid
ZwClose
ZwUnmapViewOfSection
PsSetCreateProcessNotifyRoutine
RtlInitUnicodeString
wcscat
wcscpy
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
MmGetSystemRoutineAddress
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
swprintf
IoRegisterDriverReinitialization
KeDelayExecutionThread
ZwCreateKey
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
RtlAnsiStringToUnicodeString
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
PsGetVersion
_wcslwr
wcsncpy
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 900B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 704B - Virtual size: 694B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ