Static task
static1
General
-
Target
e5027fdf5e68f53a97a7cf5e8b10e00e21b72a1cfd9308b4f2bb2231e0089964
-
Size
40KB
-
MD5
b3d9a1b68f62f353409d95da5c10c47c
-
SHA1
2d380246939e9e2cfd09b18b8327ee4ebd1ecc8c
-
SHA256
e5027fdf5e68f53a97a7cf5e8b10e00e21b72a1cfd9308b4f2bb2231e0089964
-
SHA512
fc308f51c791de4e3c459fb19ce2c2537218de599dc45e19084243a1223a4d7f95259a0cb6a2010dbf6b6e9f215270b14eb8e11b86aea8241c5063fb8eac6258
-
SSDEEP
768:ECMgJAlQ9OVOSJ3VFb4Bzgtz1+mvWpc90OQm1+9g/40wIlkh:BlJAArSJlFbYSz1+CX90p1IlU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e5027fdf5e68f53a97a7cf5e8b10e00e21b72a1cfd9308b4f2bb2231e0089964
Files
-
e5027fdf5e68f53a97a7cf5e8b10e00e21b72a1cfd9308b4f2bb2231e0089964.sys windows:6 windows x64 arch:x64
c954e1f6b77ef9277e84034be9c1dd7d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
isdigit
isspace
memchr
_strnicmp
strncpy
strstr
RtlInitAnsiString
RtlInitUnicodeString
RtlAnsiStringToUnicodeString
RtlUnicodeStringToAnsiString
RtlFreeUnicodeString
RtlFreeAnsiString
DbgPrint
KeInitializeEvent
KeSetEvent
KeWaitForSingleObject
ExAllocatePool
ExAllocatePoolWithTag
ExFreePoolWithTag
MmProbeAndLockPages
PsCreateSystemThread
IoAllocateIrp
IoAllocateMdl
IoBuildDeviceIoControlRequest
IofCallDriver
IoCancelIrp
IofCompleteRequest
IoCreateDevice
IoCreateFile
IoFreeIrp
IoFreeMdl
IoGetDeviceObjectPointer
IoGetRelatedDeviceObject
IoRegisterShutdownNotification
IoUnregisterShutdownNotification
ObReferenceObjectByHandle
ObfDereferenceObject
ZwCreateFile
ZwQueryInformationFile
ZwReadFile
ZwWriteFile
ZwClose
ZwCreateKey
ZwOpenKey
ZwFlushKey
ZwSetValueKey
MmIsAddressValid
IoGetFileObjectGenericMapping
PsLookupProcessByProcessId
IoGetDeviceAttachmentBaseRef
ZwDeleteFile
_vsnprintf
RtlIpv4StringToAddressExA
ObCreateObject
PsGetProcessWow64Process
SeCreateAccessState
ZwQuerySystemInformation
__C_specific_handler
strcmp
IoFileObjectType
KeBugCheckEx
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ