Static task
static1
General
-
Target
ab6bd388b009c3f0d9b1332d0f585c52
-
Size
16KB
-
MD5
ab6bd388b009c3f0d9b1332d0f585c52
-
SHA1
ffc886c0d8f4264319643537822d25ac1f342cd3
-
SHA256
cff9aa320b46984bc79772af3f9f2e2edb1e480050978ad587f951530e348022
-
SHA512
78795c89454b9761942eae5bca4991673199c2fdf3f83610085677df5b09a967be25b8b144ea57e32cc2df9b3cdb2d95b195c0bed46e8bcefada67b4c1ee8c7d
-
SSDEEP
384:DeHWaAI+/oqcen1BKU4wFu8zUNQ/Z5o58yabwjohS:00onYZE89
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab6bd388b009c3f0d9b1332d0f585c52
Files
-
ab6bd388b009c3f0d9b1332d0f585c52.sys windows:4 windows x86 arch:x86
95ef832a5045a1085ab1fafa5d3d242e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
IoCreateDevice
IoCreateSymbolicLink
IofCompleteRequest
KeServiceDescriptorTable
ZwWriteFile
ZwTerminateProcess
ZwReadFile
ZwQueryInformationProcess
ZwQueryInformationFile
ZwQueryDirectoryFile
ZwOpenThread
ZwOpenProcess
ZwDeleteFile
ZwCreateFile
ZwClose
ZwAllocateVirtualMemory
RtlCompareUnicodeString
NtLockFile
_strnicmp
PsLookupProcessByProcessId
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 630B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 576B - Virtual size: 568B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 960B - Virtual size: 948B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ