Static task
static1
General
-
Target
c59cbaf5844245e75d287a471bd95fce
-
Size
28KB
-
MD5
c59cbaf5844245e75d287a471bd95fce
-
SHA1
26de16252e5d4b2e0a2898e6e9ec67c2b798e5f8
-
SHA256
2ceaa40b3e3368bf8ac945abdcd4fb52364c18f9a80afc2ab598d1df4ab9fb2f
-
SHA512
4ba05f6fa024dcab4fd40fe52219b6d4df65f70074edac9524b79209fa8291c15c964636167216e5e7cff8a2f92ccb975bd2424253cf80b169badcd445a30d13
-
SSDEEP
384:aUez6YCIzm/bi5OELyDEEtyBPjvgeKaNRfjQTWrlgZ0VS7y3:auIzmDaOELyDEEtyBsXaN9jaAgZ0Va
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c59cbaf5844245e75d287a471bd95fce
Files
-
c59cbaf5844245e75d287a471bd95fce.sys windows:4 windows x86 arch:x86
e835ffcde26c03ac907545dc1be0c87c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
wcslen
swprintf
RtlInitUnicodeString
strncmp
IoGetCurrentProcess
wcscpy
wcscat
ExFreePool
_snprintf
ExAllocatePoolWithTag
ZwQuerySystemInformation
_strnicmp
ZwUnmapViewOfSection
MmGetSystemRoutineAddress
_wcsnicmp
MmIsAddressValid
IofCompleteRequest
RtlCopyUnicodeString
RtlAnsiStringToUnicodeString
_stricmp
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlCompareUnicodeString
ExGetPreviousMode
strncpy
_except_handler3
ObfDereferenceObject
ObQueryNameString
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 736B - Virtual size: 724B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ