Static task
static1
General
-
Target
545e6bb6a8c9117a7bd60484996b80f4
-
Size
25KB
-
MD5
545e6bb6a8c9117a7bd60484996b80f4
-
SHA1
99e37477135ee7a9e3a4918989db0c3c45533620
-
SHA256
cd7c3a22710ada659fc00a8caeff6efd7fcf07a0efb08e4258730c4fad060380
-
SHA512
76fecea94ad7ea6d5f557d37c4ee4abbb8c4f82f8381a7658c2d31d33ef5547e6976f7ce5865d655dbb0d3192377ad602bb0c1cb9bdfafd225d27f6f13d181af
-
SSDEEP
768:ZSfxvSNZ0bxlsb31Li+VmzcuID04eDuacmbNeWklY1qqNPx:QfxvSXQLsb31Li9zcuIgdDvcmbvgsx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 545e6bb6a8c9117a7bd60484996b80f4
Files
-
545e6bb6a8c9117a7bd60484996b80f4.sys windows:5 windows x86 arch:x86
5f9878a514c159b993fea216e0e07c26
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
_except_handler3
_wcsnicmp
wcslen
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
PsCreateSystemThread
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
IoGetCurrentProcess
ExGetPreviousMode
KeServiceDescriptorTable
ZwSetValueKey
PsGetVersion
IofCompleteRequest
_strnicmp
ExFreePool
wcscpy
ZwEnumerateKey
wcscat
ExAllocatePoolWithTag
KeDelayExecutionThread
wcsncmp
towlower
strncmp
strncpy
wcsstr
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ZwQueryInformationFile
ZwCreateFile
ZwDeleteValueKey
IoRegisterDriverReinitialization
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 896B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ