Static task
static1
General
-
Target
2aadb6c7b6d326fcab89eb45000e5576
-
Size
40KB
-
MD5
2aadb6c7b6d326fcab89eb45000e5576
-
SHA1
a0a2933de8d2811e72c69efd8c225a5b826f1a8d
-
SHA256
e5342f07b2124fb240d7fd104539c6e9e60ef534c7d94bbea75d3db3f72e952b
-
SHA512
dd01e40e27c4d79535b04ceed7b554c50c9498e3849db447f0e26204fcaa28adb14b5a3cc3ea634deccea683a7ea87e8f7d9cea46ae48beb75ee8e706232f9e8
-
SSDEEP
768:x6Yzh30bNpsb+StvoKadjf3ia5mooje5EAQS5hxbN24io7+1eVBviOMGBF:xLzh30bNpsbXbaxj5moiexQS5E4R7+sr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2aadb6c7b6d326fcab89eb45000e5576
Files
-
2aadb6c7b6d326fcab89eb45000e5576.sys windows:4 windows x86 arch:x86
17b457777dc0021de014649236cdb566
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
RtlInitUnicodeString
wcslen
ZwCreateKey
swprintf
wcsncpy
wcsrchr
strncmp
ZwOpenKey
RtlCompareUnicodeString
ObReferenceObjectByHandle
wcscat
wcscpy
strncpy
IoGetCurrentProcess
_wcsnicmp
MmIsAddressValid
_wcsicmp
ZwQueryValueKey
_except_handler3
ZwDeleteKey
MmGetSystemRoutineAddress
IoRegisterDriverReinitialization
ObfDereferenceObject
KeQuerySystemTime
ZwSetValueKey
KeDelayExecutionThread
RtlAnsiStringToUnicodeString
ZwSetInformationFile
ZwCreateFile
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_snwprintf
wcschr
_stricmp
wcsstr
_wcslwr
PsLookupProcessByProcessId
PsGetVersion
ExAllocatePoolWithTag
ExFreePool
_snprintf
RtlCopyUnicodeString
PsSetCreateProcessNotifyRoutine
PsCreateSystemThread
IofCompleteRequest
KeTickCount
KeQueryTimeIncrement
IoDeviceObjectType
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 96B - Virtual size: 71B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ