Static task
static1
General
-
Target
7c36268b88b9f5bd661a7fb85300d2e0
-
Size
47KB
-
MD5
7c36268b88b9f5bd661a7fb85300d2e0
-
SHA1
be0b38e56fece3d55694f09ea6f816f1a6bf971a
-
SHA256
bfb828b5bf9bea1c622cba40ea41f1a6d52564ee738a7b38f2774137bfa2cd6e
-
SHA512
372d3232881590121a360710706c2d9ee350114d387e8ea028a85ba88799364b7c0936a689a1f7e6a1d3ebbfa7b8b99e0b97f7add726c10fd415dc875a659103
-
SSDEEP
768:bwQ0LTDQgIF1Pxu4CeOjpq+TMut5xN1balEAk2mL1YbtpDyle:bws4F5xgEFP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7c36268b88b9f5bd661a7fb85300d2e0
Files
-
7c36268b88b9f5bd661a7fb85300d2e0.sys windows:4 windows x86 arch:x86
c61e86018e579f1e4193439cb709d4d4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitUnicodeString
ZwClose
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
wcscat
wcscpy
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
RtlAnsiStringToUnicodeString
ZwCreateFile
ZwEnumerateKey
ZwSetValueKey
ZwOpenKey
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
MmIsAddressValid
swprintf
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
PsGetVersion
_wcslwr
wcsncpy
ZwCreateKey
IoRegisterDriverReinitialization
PsSetCreateProcessNotifyRoutine
ZwUnmapViewOfSection
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 900B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 704B - Virtual size: 694B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ