Static task
static1
General
-
Target
7651763cb4b1cf9e430a7db8f1b76b5b
-
Size
40KB
-
MD5
7651763cb4b1cf9e430a7db8f1b76b5b
-
SHA1
5c98d66f108db49417249ad2b292abe1b7a67a19
-
SHA256
52edbe62d961ae849d21bbfd3830478cbdf3a1b1b84dc00f3f42d30f2657ee3d
-
SHA512
bb80eeb16b60cc648be330c437b6e6c675bfab862398159ec9f846354fb464d34edf9230bc689a9db8eb370f831741ce79487b2e46fb74e8fb4a171f413f5f4e
-
SSDEEP
768:1j2gSXLcp8cOf92yqSYGjg4uTPa4SSQkVl+7PnBocgBGt09BHcxwPMLP+mcE4:1yb7cplsIm84kaQQkH+rnpgBGm9BHc2f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7651763cb4b1cf9e430a7db8f1b76b5b
Files
-
7651763cb4b1cf9e430a7db8f1b76b5b.sys windows:4 windows x86 arch:x86
cc33952d127f95431c6a586ef25f9176
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlCompareUnicodeString
RtlInitUnicodeString
ZwSetValueKey
wcslen
KeQuerySystemTime
ObReferenceObjectByHandle
IofCompleteRequest
ZwClose
ZwQueryValueKey
strncpy
PsLookupProcessByProcessId
_stricmp
ZwOpenKey
_except_handler3
KeTickCount
KeQueryTimeIncrement
ZwSetInformationFile
ZwCreateFile
wcscpy
swprintf
wcsncpy
MmIsAddressValid
IoGetCurrentProcess
PsGetVersion
_snwprintf
ExAllocatePoolWithTag
_wcsnicmp
ObfDereferenceObject
strncmp
wcschr
_wcsicmp
PsCreateSystemThread
wcsstr
_wcslwr
ZwCreateKey
wcsrchr
ExFreePool
_snprintf
IoDeviceObjectType
PsSetCreateProcessNotifyRoutine
RtlCopyUnicodeString
ZwDeleteKey
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
wcscat
MmGetSystemRoutineAddress
RtlAnsiStringToUnicodeString
IoRegisterDriverReinitialization
KeDelayExecutionThread
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 62B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ