m_regs
Static task
static1
General
-
Target
9747a379d101323d934f24e3c1dd39cb
-
Size
20KB
-
MD5
9747a379d101323d934f24e3c1dd39cb
-
SHA1
8b602046bba5082175c8148ab52051d34ee85c5d
-
SHA256
5cebc6685648823c8a2d695aed2166433eddc812e518e58d5805b762fa81f571
-
SHA512
b3e6e3924fa3d9a6f55043ea63f4d63f2ee9a585496034db717219fb1413abab8d3664a3396ac3d0e4c9bf764024672ca31c87a228630fea33b96b8b28c5cdac
-
SSDEEP
96:ZUGAnoSu/1L0LvFZvRtysrH/s5UhYZPSr4phQjuHfWcOFenEFjMMoiR4c8:KGAnA1+vRziZPSrYhQErYj0rc8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9747a379d101323d934f24e3c1dd39cb
Files
-
9747a379d101323d934f24e3c1dd39cb.sys windows:5 windows x86 arch:x86
0aacc2b50ecc7315cd3ce4d862d7e57d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
MmIsAddressValid
RtlFreeAnsiString
_strupr
RtlUnicodeStringToAnsiString
strncmp
IoGetCurrentProcess
strrchr
PsGetCurrentThreadId
PsGetCurrentProcessId
strstr
PsLookupProcessByProcessId
strncpy
RtlInitUnicodeString
KeServiceDescriptorTable
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwReadFile
ZwClose
ZwCreateFile
ExFreePool
ExAllocatePoolWithTag
IoCreateSymbolicLink
IoCreateDevice
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
Exports
Exports
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 224B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 96B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 736B - Virtual size: 716B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 480B - Virtual size: 450B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ