Static task
static1
General
-
Target
804175d1f59f1b531b32076115aaf6d5
-
Size
7KB
-
MD5
804175d1f59f1b531b32076115aaf6d5
-
SHA1
a8fab085e72794b0a8656a8922aac9eb48093c63
-
SHA256
d6b831dae31bb513b5d643e33fd0bc0971b3931a239c4dcf0da6c979b2256a21
-
SHA512
7df6080b2f205a3e52de30d7f3d530f7200d158ca57f60dd5657dbf665592fd7717e5ac542a05c82168f6d6c9e5a0ef92b261487876ecf028ef2ebae5be658d6
-
SSDEEP
192:EQPdv/g0Tlu+tK1kijm+rhxe7pyV62eU:nPdvthjijlrh87pywf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 804175d1f59f1b531b32076115aaf6d5
Files
-
804175d1f59f1b531b32076115aaf6d5.sys windows:4 windows x86 arch:x86
e585e9ef33bb6f70c1546d9a6d615668
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExAllocatePoolWithTag
ExFreePoolWithTag
PsSetLoadImageNotifyRoutine
ObMakeTemporaryObject
KeInitializeApc
KeInsertQueueApc
FsRtlIsNameInExpression
RtlImageDirectoryEntryToData
ExAllocatePool
ZwQueryDirectoryFile
KeGetCurrentThread
PsRemoveLoadImageNotifyRoutine
RtlWriteRegistryValue
KeServiceDescriptorTable
ObfReferenceObject
RtlCreateRegistryKey
ZwEnumerateKey
ZwAllocateVirtualMemory
memcpy
memset
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 206B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ