Static task
static1
General
-
Target
2c2eb0e7a04ac175dcc583744150d75f
-
Size
47KB
-
MD5
2c2eb0e7a04ac175dcc583744150d75f
-
SHA1
d5ea0b16196b3d3c464faa18c5891d1f4f20579e
-
SHA256
175d1e4a183b94af67cdb8032530dfff9831256e9ddcc0afa155f06df3fa34d9
-
SHA512
0757b17aee4cf1257c10a0888c1a79eef3a62a37b119d5d74f33f0c60f37fdb47266a5b549256011ab0bb84893a2e8db3d46506c4098360f68fde86a0354e23a
-
SSDEEP
768:Km4txaAGX2oJdTZJvrK7/DWFgbEnj/qecC/Crj/Pu:p4txaFnJpZJvG7/DWFgbmzpDG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c2eb0e7a04ac175dcc583744150d75f
Files
-
2c2eb0e7a04ac175dcc583744150d75f.sys windows:4 windows x86 arch:x86
315a5f8c43e61ff0062125f510c4a158
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitUnicodeString
PsSetCreateProcessNotifyRoutine
wcscat
wcscpy
ZwClose
ZwCreateFile
IoRegisterDriverReinitialization
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
RtlAnsiStringToUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
MmIsAddressValid
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
PsGetVersion
_wcslwr
wcsncpy
swprintf
ZwUnmapViewOfSection
ZwCreateKey
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 900B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 736B - Virtual size: 710B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ