Static task
static1
General
-
Target
4f30cadd64d1e7b7978cf4df1660f66a
-
Size
27KB
-
MD5
4f30cadd64d1e7b7978cf4df1660f66a
-
SHA1
bc0195dd16cffc7e4a75381ae8e259d2433b8357
-
SHA256
669bad6d78e7b6e9b562c88b0970105ca2700af54d97fffa8bdfe2500a13465a
-
SHA512
432252484ab29d00f8cc3d6bf360a822dbe0b9bb0d02b57ffa7a13be8710cf693ca9ea24431515061d586dc732ff781e35123dd9c3751f5f582117e700ba4a94
-
SSDEEP
384:zg796AKAwm6YwF2a1awYkW41vIF8XINiYMTPXYu6frgZJxR:zO6Alw3LF2qawYkt1vIFRN/MZ6frUR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4f30cadd64d1e7b7978cf4df1660f66a
Files
-
4f30cadd64d1e7b7978cf4df1660f66a.sys windows:5 windows x86 arch:x86
c78f6651f06bfd31b37e493840317aa8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwCreateFile
RtlInitUnicodeString
IoRegisterDriverReinitialization
_strnicmp
ExFreePool
wcscpy
ZwEnumerateKey
wcscat
ExAllocatePoolWithTag
ZwOpenKey
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
PsCreateSystemThread
_wcsnicmp
wcslen
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
IofCompleteRequest
IoGetCurrentProcess
KeDelayExecutionThread
wcsncmp
towlower
ZwDeleteValueKey
_except_handler3
ZwQueryValueKey
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
ExGetPreviousMode
KeServiceDescriptorTable
ZwSetValueKey
PsGetVersion
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ZwQueryInformationFile
strncmp
strncpy
wcsstr
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 800B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ