Static task
static1
General
-
Target
99e9c3e82b7c9ff142d0d53f08be92d2
-
Size
41KB
-
MD5
99e9c3e82b7c9ff142d0d53f08be92d2
-
SHA1
1775692ae748f96ca5aef955e1456d95f33ced6a
-
SHA256
d3363fd1b9f0ff3b7eef13992c772f9c2f493a712ec906984ced7596e93323b0
-
SHA512
b4543bb2bdd53272a0517d4e67d95356ae04df2f9fd5799f1b325be0310cb572aac574f15a0a3773c5dc74d07988acdf93b848ad95b4bd60a874984018e58469
-
SSDEEP
384:2+TZBuVd0p5r4mPmh688YLc/jQ7SbR9PUoEkJ6Ho3LbKGiTOgh:2Kmamh68BLcs7SbR9PnCALuGgNh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 99e9c3e82b7c9ff142d0d53f08be92d2
Files
-
99e9c3e82b7c9ff142d0d53f08be92d2.sys windows:4 windows x86 arch:x86
f37e268d8a07c4a1b4f9ad9aeddedd13
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeServiceDescriptorTable
ZwDeviceIoControlFile
IofCompleteRequest
memcpy
strncmp
strlen
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoGetCurrentProcess
IoCreateSymbolicLink
IoCreateDevice
RtlFreeUnicodeString
RtlCompareUnicodeString
RtlAnsiStringToUnicodeString
_snprintf
PsGetCurrentProcessId
ExFreePool
memset
ExAllocatePoolWithTag
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 154B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 538B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 238B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ