Static task
static1
General
-
Target
4d3d464f3da9ff600bdef3cc8d0fd15b
-
Size
28KB
-
MD5
4d3d464f3da9ff600bdef3cc8d0fd15b
-
SHA1
763215505b7037ce2065464f1890d4a8708831ec
-
SHA256
ca4ee10ac7a977727a48166b1eff56f551f1260f1044ca0319a616621aa666cb
-
SHA512
248f4a3c4a1676d2d320c5d71211d5c8997159e0bd9b2233cc5b64decb6aea89047b84175bf816f7d2abd7f6cda995ddb4549a734ebb7308ec4629537824078e
-
SSDEEP
768:cqqTf94IfuEYgu4Foy+unA/Exv+A+bcpU412Bx:cdTlVK4FolGAs0/bKkB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d3d464f3da9ff600bdef3cc8d0fd15b
Files
-
4d3d464f3da9ff600bdef3cc8d0fd15b.sys windows:4 windows x86 arch:x86
7241eb30f64d44e9e7662c5b1bde870a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
swprintf
RtlInitUnicodeString
_strnicmp
wcslen
wcscat
wcscpy
_stricmp
strncpy
_wcsnicmp
ZwClose
ZwOpenKey
_itow
MmGetSystemRoutineAddress
RtlAnsiStringToUnicodeString
ObfDereferenceObject
_except_handler3
ExFreePool
_snprintf
ExAllocatePoolWithTag
RtlCopyUnicodeString
IofCompleteRequest
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 866B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ