Static task
static1
General
-
Target
2267a6498d9899886718ae24dd680db8
-
Size
55KB
-
MD5
2267a6498d9899886718ae24dd680db8
-
SHA1
9acde6c143b0bd5687402d89e7dae2ef632ec2d6
-
SHA256
e2d8b6bfa171a15af6684eb579acf4989353b38f86483232e8495a4b69b9daac
-
SHA512
7b2d3a74c3f80f9732136a485c4e3110a7a3a31972ee0d21a5fda81108c45ab8b6c063259e90af02db72d5461a8b8c4b3dd226b3bf1ab62f89d3de4a3d7b14f3
-
SSDEEP
1536:vLruateXI0H7iWCs/m93yLlDxJuG39ipX6T:jrzteXI0b/SeipS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2267a6498d9899886718ae24dd680db8
Files
-
2267a6498d9899886718ae24dd680db8.sys windows:4 windows x86 arch:x86
b24b24caf94b947b04f0ffe2f0514aec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
IoGetCurrentProcess
ZwClose
ZwCreateFile
RtlInitUnicodeString
IoRegisterDriverReinitialization
ZwQueryValueKey
ZwOpenKey
_except_handler3
KeDelayExecutionThread
PsCreateSystemThread
ZwSetValueKey
wcsstr
MmGetSystemRoutineAddress
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
ExGetPreviousMode
PsGetVersion
ExFreePool
ExAllocatePoolWithTag
wcsncmp
wcslen
towlower
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ZwQueryInformationFile
strncmp
strncpy
wcscpy
ZwEnumerateKey
wcscat
_strnicmp
RtlCopyUnicodeString
ZwDeleteValueKey
_wcsnicmp
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
Sections
.text Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 448B - Virtual size: 417B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 992B - Virtual size: 982B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ