Static task
static1
General
-
Target
5140356d9fe296197ee6706042fb3bee
-
Size
30KB
-
MD5
5140356d9fe296197ee6706042fb3bee
-
SHA1
c4747a8f7015f8fefd635ea50c471a1c0ab19456
-
SHA256
09644b50a3a7806ef62e3e6997f0a7b2a963f1812f0f57a69fb5ae2e01ddb487
-
SHA512
c9e274641afc70102586e91bf0a283c5323513b102161af21a4e9f4a014ff924f56a10821725a9edc8f67d7435f58fd9d9ce7d43b3ce844ecbcf74e177bce320
-
SSDEEP
768:qNKEz6zylD/32Le9q7qyWtXkx02hr/hldBw3WcCfknc:qoE+K/3se0/xZxpm3W3fk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5140356d9fe296197ee6706042fb3bee
Files
-
5140356d9fe296197ee6706042fb3bee.sys windows:5 windows x86 arch:x86
38adb4abc0b6b53edb98e495b497eeb0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwCreateFile
RtlInitUnicodeString
IoRegisterDriverReinitialization
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
IoGetCurrentProcess
ExGetPreviousMode
KeServiceDescriptorTable
ZwSetValueKey
PsGetVersion
wcsncmp
wcslen
towlower
ZwDeleteValueKey
KeDelayExecutionThread
_except_handler3
PsCreateSystemThread
ZwQueryValueKey
ZwOpenKey
IofCompleteRequest
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
wcscat
wcscpy
_strnicmp
wcsstr
ExFreePool
ZwEnumerateKey
ExAllocatePoolWithTag
_wcsnicmp
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ZwQueryInformationFile
strncmp
strncpy
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 832B - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ