Static task
static1
General
-
Target
3dc2ad8afd836b5e31a45ef4e87553ee
-
Size
274KB
-
MD5
3dc2ad8afd836b5e31a45ef4e87553ee
-
SHA1
f4f9f10005e808d8a36aac6465816cf2dde90185
-
SHA256
8cc5d362d7ecfe379d5baef99b9d03944deece3824762083e73b9664d2b58008
-
SHA512
30bca3d8abda9122347bfb32dc768ef3d56301d4106a49470188fec1a5c72a78ee2a87eb8202ebff3d4e77f6a182c4d4b4739fbe75abea86d68241e3857e42c9
-
SSDEEP
6144:VcDAaSWRgP8F7C0hQUSmBp2XlV8jO7yXs:V0AaS4/vqyO72s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3dc2ad8afd836b5e31a45ef4e87553ee
Files
-
3dc2ad8afd836b5e31a45ef4e87553ee.sys windows:5 windows x86 arch:x86
f5a7e7bf026ceb558aa9473b2a13f4e4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcscpy
ExFreePoolWithTag
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
ExAllocatePoolWithTag
ZwReadFile
ZwClose
ZwQueryInformationFile
ZwOpenFile
ZwWriteFile
ZwCreateFile
wcscat
MmGetSystemRoutineAddress
PsGetVersion
strncmp
IoGetCurrentProcess
ZwMapViewOfSection
ZwCreateSection
_stricmp
ZwUnmapViewOfSection
PsSetCreateProcessNotifyRoutine
IofCompleteRequest
KeWaitForSingleObject
MmUnlockPages
KeInsertQueueApc
KeInitializeApc
KeInitializeEvent
KeUnstackDetachProcess
MmMapLockedPagesSpecifyCache
KeStackAttachProcess
IoFreeMdl
MmProbeAndLockPages
IoAllocateMdl
_except_handler3
KeSetEvent
PsTerminateSystemThread
ZwAllocateVirtualMemory
ZwOpenProcess
PsCreateSystemThread
PsLookupProcessByProcessId
Sections
.text Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 470B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 768B - Virtual size: 662B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ