Static task
static1
General
-
Target
8c1baa98f8116344789d03f85490e6d3
-
Size
10KB
-
MD5
8c1baa98f8116344789d03f85490e6d3
-
SHA1
f3f8356271f9744f066c40da4c121584233697f1
-
SHA256
76fe27ca9fa9c777d63773a2f78a544a3d81e1a1b56e0b7b53886c20fce02390
-
SHA512
49c08d3f194970dc65002a5ee755529664177be1639ce625a295d6ea1a5d077a4d9d5a8ac9c0cd0bb925e6b9cf1cab0c9a227e34e29f71d96feaebed76e7f1a5
-
SSDEEP
96:wuLXVHpVXkEvpE20K+RLDhcFoHcKIX0Ym+c8Inl6r2IM7yf41e/myiQxM5hQ:wuLXVHp9kg30b7PYkYmN8TqtS41e/mb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c1baa98f8116344789d03f85490e6d3
Files
-
8c1baa98f8116344789d03f85490e6d3.sys windows:4 windows x86 arch:x86
d91af52c8b056138d1cb849fed07901e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncpy
memmove
ExFreePool
ExAllocatePoolWithTag
IofCompleteRequest
NtQueryDirectoryFile
NtQuerySystemInformation
IoGetCurrentProcess
ZwQueryObject
strncmp
RtlInitUnicodeString
wcscmp
wcscpy
IoCreateSymbolicLink
IoCreateDevice
KeInitializeSpinLock
NtDeviceIoControlFile
IoDeleteDevice
IoDeleteSymbolicLink
_wcsupr
hal
KfAcquireSpinLock
KfReleaseSpinLock
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 363B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 584B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 586B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ