Static task
static1
General
-
Target
4c0080e5af753d24de62133bf641ed51
-
Size
16KB
-
MD5
4c0080e5af753d24de62133bf641ed51
-
SHA1
391942d3ad0005cf3cc785f93d43a5f823e79b30
-
SHA256
704013a37e8be083fec3459664352080a4cf955a83ec4df94d244b19802d720f
-
SHA512
8f5e0fdb2fa3d2f7bf199e59ea40915faf3eb7f722b8be07931e76f8604f30b46c54f808d9441807d83ed82f4b002d3aa9c5de2e925067e3170c4ddbf504b553
-
SSDEEP
96:er7+ymgDaudST5dnUCKm4j9lkB8uZFouroCQIZPKGjCq6yOHoJ7Lr:er71dSldbKm4j9lkB8EqShPKiJuox
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c0080e5af753d24de62133bf641ed51
Files
-
4c0080e5af753d24de62133bf641ed51.sys windows:5 windows x86 arch:x86
b8d25b0f428c8aa321d54cdbc89da389
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
ntoskrnl.exe
MmIsAddressValid
ZwClose
ZwOpenKey
RtlFreeUnicodeString
ZwDeleteFile
RtlInitUnicodeString
ZwQueryValueKey
RtlAnsiStringToUnicodeString
RtlInitAnsiString
_stricmp
strrchr
ZwQuerySystemInformation
RtlCompareMemory
ObfDereferenceObject
KeUnstackDetachProcess
ZwUnmapViewOfSection
ProbeForWrite
ProbeForRead
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
KeStackAttachProcess
PsLookupProcessByProcessId
_except_handler3
NtBuildNumber
ExFreePool
RtlCompareUnicodeString
ExAllocatePoolWithTag
hal
KfLowerIrql
KfRaiseIrql
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 800B - Virtual size: 800B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 320B - Virtual size: 310B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ