Static task
static1
General
-
Target
7471a8a1f2f621b0b64db1c376cb7cda
-
Size
48KB
-
MD5
7471a8a1f2f621b0b64db1c376cb7cda
-
SHA1
550e615cbc2181925d4f54ccb50debfa14b4cc40
-
SHA256
a433ea7de3cadf809b899c82240f5d87b90ce63bb392fbdb71fbe0c285e9b5b3
-
SHA512
82fdd993069215e5cdd7c22979b343c10e51ad3d56eb21a2ea66e78fbfa3d29087340bb4fab906662d7233962f7dd19e0b837506acef22c2cbbee5f4618c9c54
-
SSDEEP
768:eSB/cAQT0mKjR9O1m5HqqDQrjBJp1rcpnApSZ5vQMGtQZuNfXDMP4cQWNSY2uiyh:CD1klDqdFcCe1tYxTMPnUKT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7471a8a1f2f621b0b64db1c376cb7cda
Files
-
7471a8a1f2f621b0b64db1c376cb7cda.sys windows:4 windows x86 arch:x86
50e251a8b82b20f742dd192dc5787aaf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
wcsstr
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
_except_handler3
ExFreePool
wcscpy
ZwEnumerateKey
wcscat
ExAllocatePoolWithTag
_strnicmp
PsCreateSystemThread
ZwCreateFile
IoRegisterDriverReinitialization
KeDelayExecutionThread
_wcsnicmp
wcslen
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
MmGetSystemRoutineAddress
IofCompleteRequest
IoGetCurrentProcess
wcsncmp
towlower
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ZwQueryInformationFile
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
ExGetPreviousMode
KeServiceDescriptorTable
ZwSetValueKey
PsGetVersion
strncmp
strncpy
ZwDeleteValueKey
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 992B - Virtual size: 986B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 864B - Virtual size: 860B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ