Static task
static1
General
-
Target
8d06c29a00dc76c765e58d81d44a7cc0
-
Size
3KB
-
MD5
8d06c29a00dc76c765e58d81d44a7cc0
-
SHA1
57dadf3e4a94354ca083d44dab4b8e7f6d6656b5
-
SHA256
6e4b8620409f2b4e8952a4bda9e838689daf8639d5960b938b04a0e1d0c53202
-
SHA512
8b987eac730361734380bd3ee37b9b299e6e58f6a07041b56c99da5d71f9f7a34ec4df3a8c55a732ba2a5b946a6ade1a9434be7c7a7b56067a3c1adf2862b15f
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d06c29a00dc76c765e58d81d44a7cc0
Files
-
8d06c29a00dc76c765e58d81d44a7cc0.sys windows:5 windows x86 arch:x86
7aa346b913dc64be7048aef3caa8b161
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
ZwReadFile
KeServiceDescriptorTable
ZwClose
RtlFreeUnicodeString
ZwCreateFile
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 192B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192B - Virtual size: 177B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 96B - Virtual size: 69B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 480B - Virtual size: 462B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ