Static task
static1
General
-
Target
57743b506940b9062e0a31297467484f
-
Size
40KB
-
MD5
57743b506940b9062e0a31297467484f
-
SHA1
81ef2aed40bccc5b12f455c55c6d21e2268a91f8
-
SHA256
a5230a515f13ca13c4c4e1c1b943cf7ac9c6968ef3d3f9cd41d4960874be987f
-
SHA512
1ae622b77253331e52f32890d1d5e30c76fa47bd9e9d0b1e9e6b5f853e8c4ea45d366427dbab8f97c0c6e82b2cfc0a05625d25f1dab270fa24b6933675108cf8
-
SSDEEP
768:9IKleoobrvSvtoPJEzjwa9Jo3h7cRbPlSlUJYWmeg2KaU46ebkFOLnWySNU5WX:am1ob7itoByjf9JO7sSiJpKaUQ4s6ySN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 57743b506940b9062e0a31297467484f
Files
-
57743b506940b9062e0a31297467484f.sys windows:4 windows x86 arch:x86
e022ae1eb71c0f92fe52a8d147bd1c37
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoRegisterDriverReinitialization
_stricmp
swprintf
wcsstr
_wcslwr
KeTickCount
KeQueryTimeIncrement
_wcsnicmp
wcslen
RtlInitUnicodeString
ObfDereferenceObject
ExFreePool
_snprintf
ExAllocatePoolWithTag
KeDelayExecutionThread
KeQuerySystemTime
ZwCreateKey
wcsncpy
wcsrchr
ZwSetValueKey
ZwClose
ZwQueryValueKey
ZwOpenKey
_except_handler3
RtlCopyUnicodeString
PsSetCreateProcessNotifyRoutine
PsCreateSystemThread
strncmp
MmIsAddressValid
ObReferenceObjectByHandle
_wcsicmp
strncpy
PsLookupProcessByProcessId
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
PsGetVersion
IoGetCurrentProcess
wcscat
wcscpy
IofCompleteRequest
RtlCompareUnicodeString
_snwprintf
wcschr
MmGetSystemRoutineAddress
IoDeviceObjectType
ZwSetInformationFile
ZwCreateFile
RtlAnsiStringToUnicodeString
ZwDeleteKey
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 96B - Virtual size: 78B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ