Static task
static1
General
-
Target
bc70a7b384558cafbbc04f00a59cbe8d
-
Size
5KB
-
MD5
bc70a7b384558cafbbc04f00a59cbe8d
-
SHA1
b8d1b1b4b759c4380293537fc4cc3622fffbd52e
-
SHA256
36e8bb8719a619b78862907fd49445750371f40945fefd55a9862465dc2930f9
-
SHA512
ec8badd21fe380a7475e6c3325030b3b63f351cddf74706426f65a9696d0143960bb3e8b1c04cd1ea65fb18e42ed3220b1a91f8fff885f4d1fa4ffe42fa20b57
-
SSDEEP
24:ev1GSTcEYhlcYbFUfFXs0xlTOLStQgM/dH0kluf+3aNDpbwTzFu2/xDkCeMgTDTM:qTcEYHxuHOLG7y1CvbshKCRg/TgDYVa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc70a7b384558cafbbc04f00a59cbe8d
Files
-
bc70a7b384558cafbbc04f00a59cbe8d.sys windows:10 windows x64 arch:x64
0762daf73ae7993a20fa0033c7952c91
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
ObfDereferenceObject
PsGetProcessId
ObOpenObjectByPointer
PsLookupProcessByProcessId
PsGetProcessImageFileName
_stricmp
ZwTerminateProcess
DbgPrint
ZwClose
Sections
.text Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 714B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ