Static task
static1
General
-
Target
8808072ce1d2e4d74fccba8cf7bff58e
-
Size
40KB
-
MD5
8808072ce1d2e4d74fccba8cf7bff58e
-
SHA1
f4dc09417802a9d723eaac09c9b6259b49d3f098
-
SHA256
f374c38cdc211855bf48b7bf66688581ac2f2ced4777c6709c913299b71167f6
-
SHA512
c26ac30b30b1ff16a0733fee27f8e34455f6dabc005f4299eb895c7ca03a03428dea075356d5544e9ece3382eae1783d9a26967020c10a58db806de1b1e19db5
-
SSDEEP
768:79HAzIFs9rhwOkxZQJtQex7CulsrMqtTG3jY7PEfsVaR/ENagGYkdP80F9S0pKI:WzfhJkTQJdxvsrFtK3jYrHVtNag1kdP3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8808072ce1d2e4d74fccba8cf7bff58e
Files
-
8808072ce1d2e4d74fccba8cf7bff58e.sys windows:4 windows x86 arch:x86
6b74148e37d931e6af133f27215fc2d6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_stricmp
swprintf
wcsstr
_wcslwr
ZwClose
ZwSetValueKey
ZwCreateKey
RtlInitUnicodeString
MmGetSystemRoutineAddress
ExFreePool
_snprintf
ExAllocatePoolWithTag
ObReferenceObjectByHandle
ZwDeleteKey
ZwOpenKey
MmIsAddressValid
IoDeviceObjectType
strncpy
IoGetCurrentProcess
PsCreateSystemThread
strncmp
ObfDereferenceObject
KeQuerySystemTime
ZwQueryValueKey
_except_handler3
_wcsicmp
wcsncpy
wcslen
wcsrchr
_wcsnicmp
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_snwprintf
wcschr
IofCompleteRequest
wcscat
wcscpy
PsGetVersion
ZwSetInformationFile
ZwCreateFile
RtlCopyUnicodeString
IoRegisterDriverReinitialization
RtlAnsiStringToUnicodeString
KeDelayExecutionThread
KeTickCount
KeQueryTimeIncrement
RtlCompareUnicodeString
PsLookupProcessByProcessId
PsSetCreateProcessNotifyRoutine
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 82B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ