Static task
static1
General
-
Target
4c6b9a8c3e1bc505a33843365bfff9ab
-
Size
20KB
-
MD5
4c6b9a8c3e1bc505a33843365bfff9ab
-
SHA1
43ddcc7b38b302d42a790399b74eacc38df34cfb
-
SHA256
932cde357b3fac8650d91195cfa957ef6796d4376c4274e585dd9bc5c15938de
-
SHA512
fbfd5ed2e4a06caffd430532837a7cb5d67899f886d515a421c590ced56cd677b157b27da59cfd1d62e49cc8db6c4d7074048e1a6bdfd47abb7f0c6ff624be47
-
SSDEEP
192:y6OSSSSSSSSStPE8HTcnVNYXf3fWuvksjq1qX5smICg6/k0OwneiSGmdA9VFlknW:yWMIYnVN8HQqXWTCg6/p+oPFlknS29a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c6b9a8c3e1bc505a33843365bfff9ab
Files
-
4c6b9a8c3e1bc505a33843365bfff9ab.sys windows:4 windows x86 arch:x86
ba692d3ad51781ee11b0fdddee4ef37c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
IoCreateDevice
IoCreateSymbolicLink
IofCompleteRequest
KeServiceDescriptorTable
ZwWriteFile
ZwTerminateProcess
ZwSetValueKey
ZwReadFile
ZwQueryInformationProcess
ZwQueryInformationFile
ZwQueryDirectoryFile
ZwOpenThread
ZwOpenProcess
ZwCreateKey
ZwCreateFile
ZwClose
ZwAllocateVirtualMemory
RtlCompareUnicodeString
NtLockFile
_strnicmp
PsLookupProcessByProcessId
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 864B - Virtual size: 862B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 592B - Virtual size: 586B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ