Static task
static1
General
-
Target
971c54702cf1d3b6a4b30d7635bf02a8
-
Size
46KB
-
MD5
971c54702cf1d3b6a4b30d7635bf02a8
-
SHA1
8bada97a61d0f458c0e6f62390864bb0078de1a1
-
SHA256
63bb7a198722c8e0d32d84382c4feb42175d0d9bb851aa9ee541f0f8cd6a6d3d
-
SHA512
e0898b75f6472005e99e1505f932cbf005b6be18e3fc46f29187dd9913eb24e666addfc277ef442760ee4211d8009f6a48573270916c4c8946981344417053a9
-
SSDEEP
768:KTV+HSRTNQOwyrMBGjk9fxlvZtFByXW0NpfyPn0ILawcOpYHyPZSxyAZspGl5qCr:KTVKSRTGMtkhxlvZfBGW0NpfyPn0ILOW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 971c54702cf1d3b6a4b30d7635bf02a8
Files
-
971c54702cf1d3b6a4b30d7635bf02a8.sys windows:4 windows x86 arch:x86
6802a1c9cc71d955521e06451f9e010f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcsncmp
wcslen
towlower
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
RtlInitUnicodeString
IoGetCurrentProcess
ExGetPreviousMode
KeServiceDescriptorTable
ZwSetValueKey
PsGetVersion
_strnicmp
ZwClose
ExFreePool
wcscpy
ZwEnumerateKey
wcscat
ExAllocatePoolWithTag
ZwOpenKey
ZwQueryValueKey
_except_handler3
wcsstr
strncmp
strncpy
KeDelayExecutionThread
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ZwQueryInformationFile
ZwCreateFile
IofCompleteRequest
_wcsnicmp
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
IoRegisterDriverReinitialization
MmGetSystemRoutineAddress
ZwDeleteValueKey
PsCreateSystemThread
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 992B - Virtual size: 986B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 864B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ