Static task
static1
General
-
Target
b46a1568b2500b850fe44c9400be2824
-
Size
16KB
-
MD5
b46a1568b2500b850fe44c9400be2824
-
SHA1
c15994843add70cb9422a001349dba86d34f062f
-
SHA256
e488fc079274271157b75017271777ab5f8147dd43e49ad7ebf5a9dc8aaf9512
-
SHA512
c6d5b3ad70dce14645026daca7ad1cd69abdb03f4eba63fb3093c7d31a5f0c34ea92c6b198a4b7ef409afe1670bcb28565b566e4c256f2887bcab815f9e7610b
-
SSDEEP
192:yyT1PtD8D3HPuIoThGCB2i45oc1TSHVLVJDoJXg8vt:yyTbQuIQB0oc1T2L/Uxgi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b46a1568b2500b850fe44c9400be2824
Files
-
b46a1568b2500b850fe44c9400be2824.sys windows:5 windows x86 arch:x86
d1c018786462782f78a25cccc14134ca
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwUnmapViewOfSection
memcpy
ExAllocatePoolWithTag
ZwMapViewOfSection
ZwOpenSection
RtlInitUnicodeString
ObfDereferenceObject
ZwAllocateVirtualMemory
ObOpenObjectByPointer
PsLookupProcessByProcessId
IofCompleteRequest
PsSetCreateProcessNotifyRoutine
Sections
.text Size: 1024B - Virtual size: 924B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 400B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ