m_regs
Static task
static1
General
-
Target
4b05fe2961525eff42f84c631eb7c97a
-
Size
21KB
-
MD5
4b05fe2961525eff42f84c631eb7c97a
-
SHA1
93c3952c937efc7ed79b3ed76ac6369b545e700c
-
SHA256
0d689b7c0953065e03598063c3d0c936e94f7a0c28dc3222c3bc1003bf2527c0
-
SHA512
33fb82163cd1839d423f1098a51925ba6669e8d69aee1ba8ca2e672bac69dbefd6060c6143f05a51ccfb9b81da81d04e9202a61b64ca85caba1f0f1d6e67bfa9
-
SSDEEP
96:ZgRj4nrgz+LGLvFfpoysNH/s7qBq5cHmdJZnlhY3zYkEwnjuHDtksq1mREJuoib6:Gd4nrG+cvjY5q9rZnlhY3dhnEPHSH1T
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b05fe2961525eff42f84c631eb7c97a
Files
-
4b05fe2961525eff42f84c631eb7c97a.sys windows:5 windows x86 arch:x86
0aacc2b50ecc7315cd3ce4d862d7e57d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
MmIsAddressValid
RtlFreeAnsiString
_strupr
RtlUnicodeStringToAnsiString
strncmp
IoGetCurrentProcess
strrchr
PsGetCurrentThreadId
PsGetCurrentProcessId
strstr
PsLookupProcessByProcessId
strncpy
RtlInitUnicodeString
KeServiceDescriptorTable
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwReadFile
ZwClose
ZwCreateFile
ExFreePool
ExAllocatePoolWithTag
IoCreateSymbolicLink
IoCreateDevice
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 224B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 96B - Virtual size: 67B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 736B - Virtual size: 716B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 480B - Virtual size: 450B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ