Static task
static1
General
-
Target
584ea6052e392b9813fa01c5acf6d24c
-
Size
28KB
-
MD5
584ea6052e392b9813fa01c5acf6d24c
-
SHA1
b3a4bbb278faca2a701f0192f49c37413fee20e3
-
SHA256
c64262bcaab6722f82e29b471b0f7c754307e980cb86b76d7616cde987e0c34b
-
SHA512
b7546b7b377e921d85c1733cc079b6942cddecff93afe18cdf1b427bd1db4205f79b1090e6ee835c2b918d40aeb14d9d98a17a719aaf0f548e21aa1d9acd7109
-
SSDEEP
768:HViK2dNK5TeH0ndvgARxHrZi2w4elrRW9giJi5vbWqDB:HuY5TeqFgAR9m44YhSJF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 584ea6052e392b9813fa01c5acf6d24c
Files
-
584ea6052e392b9813fa01c5acf6d24c.sys windows:4 windows x86 arch:x86
17b494fa8ea2226ff0728cd8f0656da9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcscat
wcscpy
_itow
wcslen
_strnicmp
RtlInitUnicodeString
ZwClose
ZwOpenKey
swprintf
_stricmp
strncpy
_wcsnicmp
ObfDereferenceObject
RtlAnsiStringToUnicodeString
RtlCopyUnicodeString
IofCompleteRequest
strncmp
ExFreePool
_snprintf
ExAllocatePoolWithTag
_except_handler3
MmGetSystemRoutineAddress
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 870B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ