Static task
static1
General
-
Target
88db9262325d2a8e0db81927551262ef
-
Size
49KB
-
MD5
88db9262325d2a8e0db81927551262ef
-
SHA1
dbc18d3a96ce263f64a8168c6b9dde0df0d3165a
-
SHA256
b94d10096eec5fbfc8d0012b315e33f8d1793d86dfb1848f958fd0dd0f9df2f2
-
SHA512
3f4dcb1b1c8facae12cddcfb9654bb6524aa0f7689699a36a8aee506820b624666d0fbc1a21e4b65f8e6de617996154cb85c5e4e67dc7432f247511a14ecec07
-
SSDEEP
768:0zj4yTc8EWexpuIaMzpb9WLbMNQSyfDq1AjEhaM3erZ0K7bXNc/fqhp6At6DxNp:0UUSFJOFtfGDDjp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88db9262325d2a8e0db81927551262ef
Files
-
88db9262325d2a8e0db81927551262ef.sys windows:4 windows x86 arch:x86
868f4dc56090add8e19b28c76840e1c3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
PsGetVersion
strncpy
ZwClose
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
_except_handler3
ExFreePool
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ExAllocatePoolWithTag
ZwQueryInformationFile
ZwCreateFile
MmGetSystemRoutineAddress
wcscat
wcscpy
PsCreateSystemThread
_strnicmp
IofCompleteRequest
ZwEnumerateKey
KeDelayExecutionThread
IoRegisterDriverReinitialization
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
ExGetPreviousMode
ZwSetValueKey
_wcsnicmp
wcslen
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
wcsstr
wcsncmp
towlower
ZwDeleteValueKey
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 192B - Virtual size: 181B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 960B - Virtual size: 954B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 992B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ