Static task
static1
General
-
Target
2453ddc7f2d429d4cd138b48e66249c0
-
Size
26KB
-
MD5
2453ddc7f2d429d4cd138b48e66249c0
-
SHA1
282ffb59fde7d29b38c4982ccf0a3a3ccd83023b
-
SHA256
2fce20f99ef10b27b82c0f2c6feb4a5b8ffcf7171ebfaeb5b52ca29d228ec0a8
-
SHA512
6f4ab967bcb69e7f998e47da9fddea6168d926d4e533e0b2ad69b3d8d005db31724fc2990cf2c82d903d9195a16940ae206ff94168e512fea0cbe350d839ede5
-
SSDEEP
384:rPgfnz9DuGm6kbkmi7vn5OU0T3ZAvHjyYYqiB:8fz9/mOmiDZwJ+mtJB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2453ddc7f2d429d4cd138b48e66249c0
Files
-
2453ddc7f2d429d4cd138b48e66249c0.sys windows:4 windows x86 arch:x86
bb19166dc962426e137700dd1d76ba66
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
PsGetVersion
ZwClose
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwCreateFile
IoRegisterDriverReinitialization
RtlAnsiStringToUnicodeString
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
MmIsAddressValid
ZwEnumerateKey
ZwSetValueKey
ZwOpenKey
RtlFreeUnicodeString
ZwCreateKey
wcscat
wcscpy
ZwUnmapViewOfSection
_wcslwr
wcsncpy
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 992B - Virtual size: 986B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 672B - Virtual size: 662B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ