Static task
static1
General
-
Target
9a62d3fd69b5dbb8658ad2716e19762e
-
Size
14KB
-
MD5
9a62d3fd69b5dbb8658ad2716e19762e
-
SHA1
0ca85be130ac9be29f894eb8625e66c2c8fe3feb
-
SHA256
44fa5943a0fe69ccac8d28c9dc03d2f87145278ac16bc4b9a7d97db111d9e244
-
SHA512
8a56c9115ea6417906a298311334dded8c743333f1500038b978b1ff7a204e0c998ab7e1de887f405651aef60bccd90f2966a35e1538da5c38d74fa62e7dd32f
-
SSDEEP
384:yFkklYmkus9dsRs34qWXI2LkXrS+kqXWAQW:aknmklsmRjDkqz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a62d3fd69b5dbb8658ad2716e19762e
Files
-
9a62d3fd69b5dbb8658ad2716e19762e.sys windows:5 windows x86 arch:x86
28ac129c58f22c3258be591e0952958d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitUnicodeString
ZwClose
towlower
wcscat
wcscpy
wcsrchr
PsTerminateSystemThread
KeDelayExecutionThread
RtlWriteRegistryValue
RtlCreateRegistryKey
RtlQueryRegistryValues
ExFreePoolWithTag
ZwOpenKey
ZwEnumerateKey
ObfDereferenceObject
ZwWaitForSingleObject
ObOpenObjectByPointer
PsProcessType
_wcsnicmp
wcslen
ExAllocatePoolWithTag
RtlGetVersion
_strnicmp
IoGetCurrentProcess
ZwCreateFile
ZwReadFile
ZwQueryInformationFile
ZwWriteFile
DbgPrint
KeServiceDescriptorTable
_stricmp
RtlUnicodeStringToAnsiString
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 808B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 640B - Virtual size: 618B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ