Static task
static1
General
-
Target
b76921acff879f34b8c0869ed00d4a5f
-
Size
16KB
-
MD5
b76921acff879f34b8c0869ed00d4a5f
-
SHA1
9878e1d0108e86329766a2acb164b009c4e41bd7
-
SHA256
bb14a9b4d1e261dae43e0d4d9b1f6ba5457004b24143016c8f73bb87a0f3afef
-
SHA512
11bd83088722481d0ece064a058f7905fe9247a5e3dc63a641ca9ed5c2dcb6140c12dbc1a5ed163cb6be5ad65d0cf733bbd51ef40234bc4f56eb72e17040a3e8
-
SSDEEP
384:F8iG3B/MAFKI0HtFpuK+yh2ymVUNlGVp85NZwdUb:AM44fFh2yEUNlGjgNCUb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b76921acff879f34b8c0869ed00d4a5f
Files
-
b76921acff879f34b8c0869ed00d4a5f.sys windows:5 windows x86 arch:x86
cfd699d0ba646297b082df8082549e2c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memcpy
IoDeleteSymbolicLink
RtlInitUnicodeString
IoDeleteDevice
MmGetSystemRoutineAddress
PsTerminateSystemThread
IofCompleteRequest
PsGetVersion
KeServiceDescriptorTable
ObfReferenceObject
IoCreateSymbolicLink
ObfDereferenceObject
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ