Static task
static1
General
-
Target
97741231d5a1e5e211474df3ef10d79d
-
Size
23KB
-
MD5
97741231d5a1e5e211474df3ef10d79d
-
SHA1
5cfbbc831e5589e2816365888d2199affe14b581
-
SHA256
f484fe41ec37b32079b12ac12c03b953e82120e7a4996506a53266bf995eda02
-
SHA512
545b2ef597b328afde794dcdf6efb927b8f4f9df21a4ebb5e1dc4b7e7631fd96891ffb9c06d88bf987fd93cdda00c344b3ee11adededa0937f6734b9ef573d13
-
SSDEEP
384:jYExjMQKKDRxFjI+3LYxV+ZVMwioKUG2KoIvx/up3:0EJRRxeuzyTUG22x/4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97741231d5a1e5e211474df3ef10d79d
Files
-
97741231d5a1e5e211474df3ef10d79d.sys windows:5 windows x86 arch:x86
2739c5f19ddfa05ba77e975c7085db52
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
swprintf
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlInitUnicodeString
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
wcscat
wcscpy
MmIsAddressValid
ZwUnmapViewOfSection
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
PsGetVersion
_wcslwr
wcsncpy
RtlAnsiStringToUnicodeString
ZwCreateFile
IoRegisterDriverReinitialization
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
ZwCreateKey
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 608B - Virtual size: 596B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ