Static task
static1
General
-
Target
2b4f37fda1f1f1fc8e58375c44a27054
-
Size
50KB
-
MD5
2b4f37fda1f1f1fc8e58375c44a27054
-
SHA1
1c061c1dc8a9c2021fa4d8a42047855fbd149605
-
SHA256
1b177b3408a4eaa85b6961700bf4bc29b2d8b5a7bc004b7e9916d0a1205e7748
-
SHA512
95d1229de5e0af9b0f5366d268d45f88c9535715df9c9afee58fe40451692a833b9ecec932561b2336c3b4ffc4d1f6739afe5317540e318874a48b3ea6ce47c0
-
SSDEEP
768:w6NCkjudSfvCqjMCmdcq/KqxwJjmH0fWoEs/sxH9LbNdy:w6nJdjmHd0+u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2b4f37fda1f1f1fc8e58375c44a27054
Files
-
2b4f37fda1f1f1fc8e58375c44a27054.sys windows:4 windows x86 arch:x86
a2f3268636f39311224cb83c3138ec34
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmIsAddressValid
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
MmGetSystemRoutineAddress
RtlInitUnicodeString
ZwClose
PsTerminateSystemThread
wcscat
wcscpy
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
PsGetVersion
_wcslwr
wcsncpy
ZwUnmapViewOfSection
RtlAnsiStringToUnicodeString
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
swprintf
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
IoRegisterDriverReinitialization
ZwCreateKey
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 76B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 832B - Virtual size: 804B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 928B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 768B - Virtual size: 748B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ