Static task
static1
General
-
Target
98c97011e90c847c1753166f6f3c3356
-
Size
8KB
-
MD5
98c97011e90c847c1753166f6f3c3356
-
SHA1
ce7f99d4b933c6414719fbca58691737b4fa5c8e
-
SHA256
8e5a5a87205d7a045e504a9d7a8bd28b34737becab6566d01f33190aa02818bc
-
SHA512
c0c09cdf1bc67cba1d5ff043615652e808b71768413b174dbe67d2c8da9d5f1cb8c58fae625486d2cb0aec82a33ab62b86986e2bcc4ac3f262e41f6d225ca34f
-
SSDEEP
192:1246GJCmVxxSFSSXVA+4dv87EZ+RU/RTZ80AJybDerx7QWrGd:1V6GJCmDf+4dv87EG02t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98c97011e90c847c1753166f6f3c3356
Files
-
98c97011e90c847c1753166f6f3c3356.sys windows:4 windows x86 arch:x86
7e4706dc8a809afcf2fb1d0ed8056197
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ndis.sys
NdisGetCurrentSystemTime
NdisRegisterProtocol
ntoskrnl.exe
RtlInitUnicodeString
IoCreateDevice
IoCreateSymbolicLink
IofCompleteRequest
KeServiceDescriptorTable
MmIsAddressValid
IoGetCurrentProcess
PsLookupProcessByProcessId
ObDereferenceObject
IoGetDeviceObjectPointer
IoBuildDeviceIoControlRequest
IoCreateFile
IofCallDriver
RtlCompareUnicodeString
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 320B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 544B - Virtual size: 536B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 688B - Virtual size: 676B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ