Static task
static1
General
-
Target
c0cd89337d005d80552b871263a9e029
-
Size
44KB
-
MD5
c0cd89337d005d80552b871263a9e029
-
SHA1
dd6e3a0d98a5e693cc3df3cf03fa726016dfd4d8
-
SHA256
4810cd6379b194f150c767fa1753fd13202069746be0c7b56e772bf1d7a4b608
-
SHA512
6dd32d8300e184c93e579539f280658b09115eb3bb910d6953636c154816f4d8484b80abbf48e086d7f1ebebdae21006fb15f3ea6d655f7a7a0c91a2a38e7f06
-
SSDEEP
768:ERO/WC1JPJtFMpdqXXWtuT/90Ya7+7FEZr4NsNJ79hKwv:d+C1JPJtFMDqXXWuT/90YLFEZr4NsNJl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c0cd89337d005d80552b871263a9e029
Files
-
c0cd89337d005d80552b871263a9e029.sys windows:4 windows x86 arch:x86
651177d5ea6431498fd67a54e5d9898a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwClose
ZwCreateSection
ZwCreateFile
RtlInitUnicodeString
PsSetCreateProcessNotifyRoutine
wcscat
wcscpy
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
RtlAnsiStringToUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
swprintf
MmGetSystemRoutineAddress
PsGetVersion
_wcslwr
wcsncpy
MmIsAddressValid
ZwUnmapViewOfSection
IoRegisterDriverReinitialization
ZwCreateKey
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 900B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 736B - Virtual size: 706B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ