Static task
static1
General
-
Target
3c759b9fea5853f39e0ed846ee88b974
-
Size
48KB
-
MD5
3c759b9fea5853f39e0ed846ee88b974
-
SHA1
6c96695267511fadd3c79c74effaa8cae2a7ae1c
-
SHA256
765c3256912fa9bd237535879767c076c4db5513c69c6293fd55ea039160f4e4
-
SHA512
6d7edd992b29a84faefcb15bf8093299f6a2a7b2e6984e05b9575873d26cec12c323ec71bc36f3583913cf9ea27e8d833a1bc1ac4842f4a1c112d8c9d2dd3d23
-
SSDEEP
1536:8CNtGf6hqPRoHJMl/rIpNVph8AiNwEuVO2sr:1t8jhD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c759b9fea5853f39e0ed846ee88b974
Files
-
3c759b9fea5853f39e0ed846ee88b974.sys windows:4 windows x86 arch:x86
05b5e0c3d519bd93c081ffd3f862e5df
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_strnicmp
KeDelayExecutionThread
PsCreateSystemThread
ZwClose
ZwSetValueKey
ZwQueryValueKey
RtlInitUnicodeString
ZwOpenKey
IofCompleteRequest
IoGetCurrentProcess
ExFreePool
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ExAllocatePoolWithTag
ZwQueryInformationFile
ZwCreateFile
wcsstr
_except_handler3
ZwDeleteValueKey
MmGetSystemRoutineAddress
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
ExGetPreviousMode
PsGetVersion
wcscpy
ZwEnumerateKey
wcscat
_wcsnicmp
wcslen
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
wcsncmp
towlower
RtlCopyUnicodeString
strncmp
strncpy
IoRegisterDriverReinitialization
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 192B - Virtual size: 172B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 992B - Virtual size: 982B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ