Static task
static1
General
-
Target
750e40bb7667912ee4e0b0c699600423
-
Size
40KB
-
MD5
750e40bb7667912ee4e0b0c699600423
-
SHA1
353be93602009efb0b56b14615ca9e1557159abe
-
SHA256
457ede9a3b1a72facd39bcf726ec16cf412210b2dd1d973425344f11daff79fb
-
SHA512
02648f6a5bbc6a58fc78f31ff6639e4436ef5231d9d390d0d072721e8bb07ded8fb2ca244c4179ce1b20b2f922ae7d8d5d9a381482d3c412b48817fe4905184e
-
SSDEEP
768:DxL3DmGNUtDQoj482Ab5M9AlbvkuVf8fklYQlhUwoUYP2+jowQ8eDmBFm:p3SGiyoj48Hb1Z9f88lYQlhYUejowQ8G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 750e40bb7667912ee4e0b0c699600423
Files
-
750e40bb7667912ee4e0b0c699600423.sys windows:4 windows x86 arch:x86
fe4f7088d9e72865d429243ea69ea966
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwOpenKey
RtlInitUnicodeString
ObfDereferenceObject
MmIsAddressValid
ObReferenceObjectByHandle
wcsncpy
wcsrchr
PsGetVersion
strncmp
IoGetCurrentProcess
ZwDeleteKey
_stricmp
swprintf
wcsstr
_wcslwr
ZwCreateFile
strncpy
PsLookupProcessByProcessId
RtlCompareUnicodeString
wcslen
ZwCreateKey
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwSetValueKey
RtlCopyUnicodeString
ZwQueryValueKey
_except_handler3
ZwSetInformationFile
wcscpy
KeQuerySystemTime
IoDeviceObjectType
KeTickCount
KeQueryTimeIncrement
wcscat
_wcsicmp
PsCreateSystemThread
RtlAnsiStringToUnicodeString
_wcsnicmp
MmGetSystemRoutineAddress
ExFreePool
_snprintf
ExAllocatePoolWithTag
KeDelayExecutionThread
IofCompleteRequest
_snwprintf
wcschr
IoRegisterDriverReinitialization
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 65B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ