Static task
static1
General
-
Target
bf9d105af8a5259ea8144c16a8d104a6
-
Size
26KB
-
MD5
bf9d105af8a5259ea8144c16a8d104a6
-
SHA1
f62191bf9a7879dd196f26711f05a8912222492d
-
SHA256
d663c8dd46f0cf8abf1b0c740dc5c35778db86516645bc18f102a054a6c3fcb0
-
SHA512
0263d987037ff2006585356a5c0a4f4993a0f78343edaf8989fde1c051fb07208c7a3b96d1310ee14376f35d5fa01469f5cf863b56d55b1e5102dd94f0d4e889
-
SSDEEP
192:fTAHmeY4f9D6ddHxETGF1It5n3cIPkphg6ySv0ZpFopWCuX/oWu:bm1Z6SQItF3cI8p269MjCruXAH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf9d105af8a5259ea8144c16a8d104a6
Files
-
bf9d105af8a5259ea8144c16a8d104a6.sys windows:4 windows x86 arch:x86
74506b2c6a163c66ad36313dfe3ba61d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
RtlInitUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
_wcslwr
wcsncpy
PsGetVersion
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
ZwCreateFile
ZwEnumerateKey
ZwSetValueKey
ZwOpenKey
MmIsAddressValid
ZwUnmapViewOfSection
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
IoRegisterDriverReinitialization
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlFreeUnicodeString
ZwCreateKey
wcscat
wcscpy
RtlAnsiStringToUnicodeString
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 992B - Virtual size: 986B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 672B - Virtual size: 666B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ