Static task
static1
General
-
Target
59e24edc5392ab10091d4ccd51622df5
-
Size
27KB
-
MD5
59e24edc5392ab10091d4ccd51622df5
-
SHA1
a3cc03db98a133e15172ae28168eaf31e1a5ffe4
-
SHA256
bf5611aeaedfa92f3f087fa2eec455f7eb629ff733de52d67d4bc1a8fc331192
-
SHA512
73fceb99f3b4dc97a1f778f87aa3b20972b76be8c34e1c2a65375e340cd8286d778900bcf728fbf58b277c7acd4e3148dfbefc63516cfaac94f5206cab71864c
-
SSDEEP
384:bcB/6ihvmxD7IH9Teafpshn1tcQEqg0MtoyCHcaVCTrO5Prfo:bcJ62vmxD7IH9iVn1tpsR7rOx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 59e24edc5392ab10091d4ccd51622df5
Files
-
59e24edc5392ab10091d4ccd51622df5.sys windows:5 windows x86 arch:x86
e44f8460d88c094b0f78665424e66b9d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memset
RtlAddAccessAllowedAceEx
IoWMIQueryAllDataMultiple
IoGetDeviceInterfaceAlias
KeEnterCriticalRegion
ExAllocatePool
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 256B - Virtual size: 214B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ