Static task
static1
General
-
Target
310fb6ea3e2b06d3a81a62d0a19c0ceff04092f8522a08eacc7ce27be1dd1fd4
-
Size
2.3MB
-
MD5
b0d4fa9b7a9f9108c5fc93abeb00831b
-
SHA1
3482683dd4c4e435f3512654652038d9ba9e596b
-
SHA256
310fb6ea3e2b06d3a81a62d0a19c0ceff04092f8522a08eacc7ce27be1dd1fd4
-
SHA512
d9604bec13376ad74fcef1e67ae3ccc13991c74cbf0a423f82f82f8464a5488b3a9ea92592d0e4baff37d86c8fd6e956373db65003b561cd4ac14a332c5c089c
-
SSDEEP
49152:oju3KigY+UAJJ6ljI6lX7e0U/oVQPxyoJp1Yx+cWmh9SVaG11m8C7bC9:ojjUAojRN7HUASPv1YOw98C7bW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 310fb6ea3e2b06d3a81a62d0a19c0ceff04092f8522a08eacc7ce27be1dd1fd4
Files
-
310fb6ea3e2b06d3a81a62d0a19c0ceff04092f8522a08eacc7ce27be1dd1fd4.sys windows:6 windows x64 arch:x64
cedd22c7835bb6f7b03193ba2ab3f996
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
isdigit
isspace
memchr
_strnicmp
strncpy
strstr
RtlInitAnsiString
RtlInitUnicodeString
RtlAnsiStringToUnicodeString
RtlUnicodeStringToAnsiString
RtlFreeUnicodeString
RtlFreeAnsiString
DbgPrint
KeInitializeEvent
KeSetEvent
KeWaitForSingleObject
ExAllocatePool
ExAllocatePoolWithTag
ExFreePoolWithTag
MmProbeAndLockPages
PsCreateSystemThread
IoAllocateIrp
IoAllocateMdl
IoBuildDeviceIoControlRequest
IofCallDriver
IoCancelIrp
IofCompleteRequest
IoCreateDevice
IoCreateFile
IoFreeIrp
IoFreeMdl
IoGetDeviceObjectPointer
IoGetRelatedDeviceObject
IoRegisterShutdownNotification
IoUnregisterShutdownNotification
ObReferenceObjectByHandle
ObfDereferenceObject
ZwCreateFile
ZwQueryInformationFile
ZwReadFile
ZwWriteFile
ZwClose
ZwCreateKey
ZwOpenKey
ZwFlushKey
ZwSetValueKey
MmIsAddressValid
IoGetFileObjectGenericMapping
PsLookupProcessByProcessId
IoGetDeviceAttachmentBaseRef
ZwDeleteFile
_vsnprintf
RtlIpv4StringToAddressExA
ObCreateObject
PsGetProcessWow64Process
SeCreateAccessState
ZwQuerySystemInformation
__C_specific_handler
strcmp
IoFileObjectType
KeBugCheckEx
ExAllocatePool
NtQuerySystemInformation
ExFreePoolWithTag
IoAllocateMdl
MmProbeAndLockPages
MmMapLockedPagesSpecifyCache
MmUnlockPages
IoFreeMdl
KeQueryActiveProcessors
KeSetSystemAffinityThread
KeRevertToUserAffinityThread
DbgPrint
hal
KeQueryPerformanceCounter
Sections
.text Size: - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ncpx10 Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ncpx11 Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ncpx12 Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ