Static task
static1
General
-
Target
39c308678ef22d1389b20e05fd8dbff8
-
Size
24KB
-
MD5
39c308678ef22d1389b20e05fd8dbff8
-
SHA1
1bd56098c4fbf818f370e7f9787aa56657bffc8e
-
SHA256
96c473ab568dbddd0a8ccf3a821494c6d1a29c438757c95b6d332797c5579aae
-
SHA512
25112cefa16e1ebe0a6c4d432d62c54820ace52c38befd27954fc034bbf43c6beead685aef09bc8036995fde704401f4615405c6213c65ce5d3be83bbe1a7a82
-
SSDEEP
768:8UMUF+FOXZG2WVdRyoM+LnaE1fjab4OVE085QSNkLZp:PFEOQ2WVdRyozLnaE1Wb42E05SCr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39c308678ef22d1389b20e05fd8dbff8
Files
-
39c308678ef22d1389b20e05fd8dbff8.sys windows:5 windows x86 arch:x86
6565418bb4770fce4aa32b0abcdb543a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_wcsnicmp
wcslen
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
ZwClose
wcsstr
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
_except_handler3
strncmp
IoGetCurrentProcess
PsGetVersion
strncpy
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
PsCreateSystemThread
ZwDeleteValueKey
KeDelayExecutionThread
IofCompleteRequest
ExFreePool
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ExAllocatePoolWithTag
ZwQueryInformationFile
ZwCreateFile
_strnicmp
wcsncmp
towlower
wcscat
wcscpy
ZwEnumerateKey
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
ExGetPreviousMode
KeServiceDescriptorTable
ZwSetValueKey
IoRegisterDriverReinitialization
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 736B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ