Static task
static1
General
-
Target
9a3bde8931c52f44c392734d6e548e8c
-
Size
40KB
-
MD5
9a3bde8931c52f44c392734d6e548e8c
-
SHA1
1ffee6dbd8c4d8f8a7e69d8dfef40bac04787949
-
SHA256
13c85fdffbc060db12d47374e460f43c949fdbc31c358e40afdb43c1e9f612bd
-
SHA512
c1ab34c1d46461724791793f45363d54799d9fe127c29739d9186154cbad1945f416ecd86a9425e25e5ac50f8809058c11df94b5cf18c1451830fc98f26b71c2
-
SSDEEP
768:Oj2gSXLcp8cOf92yqSYGjg4uTPa4SSQkVl+7PnBocgBGt09BHcxwPMLGmcE4:Oyb7cplsIm84kaQQkH+rnpgBGm9BHc2X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a3bde8931c52f44c392734d6e548e8c
Files
-
9a3bde8931c52f44c392734d6e548e8c.sys windows:4 windows x86 arch:x86
cc33952d127f95431c6a586ef25f9176
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlCompareUnicodeString
RtlInitUnicodeString
ZwSetValueKey
wcslen
KeQuerySystemTime
ObReferenceObjectByHandle
IofCompleteRequest
ZwClose
ZwQueryValueKey
strncpy
PsLookupProcessByProcessId
_stricmp
ZwOpenKey
_except_handler3
KeTickCount
KeQueryTimeIncrement
ZwSetInformationFile
ZwCreateFile
wcscpy
swprintf
wcsncpy
MmIsAddressValid
IoGetCurrentProcess
PsGetVersion
_snwprintf
ExAllocatePoolWithTag
_wcsnicmp
ObfDereferenceObject
strncmp
wcschr
_wcsicmp
PsCreateSystemThread
wcsstr
_wcslwr
ZwCreateKey
wcsrchr
ExFreePool
_snprintf
IoDeviceObjectType
PsSetCreateProcessNotifyRoutine
RtlCopyUnicodeString
ZwDeleteKey
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
wcscat
MmGetSystemRoutineAddress
RtlAnsiStringToUnicodeString
IoRegisterDriverReinitialization
KeDelayExecutionThread
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 62B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ