Static task
static1
General
-
Target
36a6a29c1ab68f312c65f406fdf7a2ff
-
Size
8KB
-
MD5
36a6a29c1ab68f312c65f406fdf7a2ff
-
SHA1
5a10eecf3285f702be350527219bdea5ac06940a
-
SHA256
e9265fe71e67e2667f0a18d7ef2bf4118a73a6c4a4242c4e10214de016dd24e3
-
SHA512
1c78f4bdbbc00bc4b16d945a41731b702d8b5e5063977a894918826a78ce0a209ee756d535361866a3ffcbd50c4f38b88badf304e14be3dae31c8df48ffcb872
-
SSDEEP
192:whLKPHVwm6BzSFSSXTcbYup4vsx8PLni8zxxRtAxrrx7Q6f:wWPGZAlup4vu8Ttk5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36a6a29c1ab68f312c65f406fdf7a2ff
Files
-
36a6a29c1ab68f312c65f406fdf7a2ff.sys windows:4 windows x86 arch:x86
7e4706dc8a809afcf2fb1d0ed8056197
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ndis.sys
NdisGetCurrentSystemTime
NdisRegisterProtocol
ntoskrnl.exe
RtlInitUnicodeString
IoCreateDevice
IoCreateSymbolicLink
IofCompleteRequest
KeServiceDescriptorTable
MmIsAddressValid
IoGetCurrentProcess
PsLookupProcessByProcessId
ObDereferenceObject
IoGetDeviceObjectPointer
IoBuildDeviceIoControlRequest
IoCreateFile
IofCallDriver
RtlCompareUnicodeString
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 336B - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 864B - Virtual size: 856B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 688B - Virtual size: 676B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ