E:\CVSCLI~1\LABPRO~1\boxp\EtRK\EtRK\objchk_wnet_x86\i386\EtRK.pdb
Static task
static1
General
-
Target
8c490c9c065cc28f3230627438dc82fe
-
Size
15KB
-
MD5
8c490c9c065cc28f3230627438dc82fe
-
SHA1
82fe06459c66d206ef15a511182c011b20e62404
-
SHA256
6444dda6662aa7eeb8f7df82e26027d341e8be6b911f254c774ccc4cd3a1d9e8
-
SHA512
af588fb368105ebef43fa8cafa0adcc405a2d98cba576c363acf3ed80628c4a5988b9d33d5209e7fcea1f9888113174627386a0193d77093c18ef991d5de89c5
-
SSDEEP
192:wG+uEPNZsrviFnBUm7r2VnKITXbxpVIctFIkdIrgN+HJ0FK3PeQUG/gGX2uZQYN+:w6ipUVnKkLjBk3PeQUepLNG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8c490c9c065cc28f3230627438dc82fe
Files
-
8c490c9c065cc28f3230627438dc82fe.sys windows:5 windows x86 arch:x86
88ce92112e0014aa93af1286bf349925
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IofCompleteRequest
IoCreateSymbolicLink
IoCreateDevice
ExFreePoolWithTag
ExAllocatePoolWithTag
_except_handler3
tolower
MmIsAddressValid
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
RtlCompareMemory
RtlCompareString
RtlInitString
DbgPrint
ZwTerminateProcess
ZwOpenProcess
ZwQuerySystemInformation
_stricmp
RtlImageNtHeader
KeTickCount
KeBugCheckEx
Exports
Exports
__InvisibleDriverEntry@8
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 674B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 730B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ