Static task
static1
General
-
Target
44e1181cda9ae89ec69061b59e4cc6f5
-
Size
21KB
-
MD5
44e1181cda9ae89ec69061b59e4cc6f5
-
SHA1
bea1adc31c9f881f01c730095fb481fbf32fe1da
-
SHA256
5a1982dada14322b7390882c8ab005c812fe6054b0e4366bbcbb227960067322
-
SHA512
8fad1117ae7a7671f45ffc348c040e3062a2b3c9478739cf28a4cd878964cb46c6c551024945fdb0e7e92c91270a6ebb9bd0aa4931dac3daa5be9dd4803d1870
-
SSDEEP
384:QL+anDM0l/R9v3EyuvymGPiKpcYcYMy/zivqQErmLOx4/M3pORWquGU4vDxDYHju:w+KD//LCGI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44e1181cda9ae89ec69061b59e4cc6f5
Files
-
44e1181cda9ae89ec69061b59e4cc6f5.sys windows:5 windows x86 arch:x86
d87ebedae9c82c2e0bebc5cdeed39fb8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_except_handler3
_stricmp
IofCompleteRequest
_strupr
IoGetCurrentProcess
_strlwr
strrchr
ZwPulseEvent
IoCreateSymbolicLink
IoCreateDevice
ZwQuerySystemInformation
strncmp
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 768B - Virtual size: 744B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ycata Size: 544B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 384B - Virtual size: 358B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 506B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ