Static task
static1
General
-
Target
c72fc611c46167ae4885079c7172a423
-
Size
50KB
-
MD5
c72fc611c46167ae4885079c7172a423
-
SHA1
094a8fb07c36792cce1278fa9a97d76d4b9571a4
-
SHA256
8333f78330bf5b961473f354f80b9502731eec22fd6da72909928c78a40b46df
-
SHA512
57cbd3a40c457c476fef74f9275de1f3e8e6a72610d459cb317d4587abf2f84dc329d2c6f4dea17d5ed2395aa8008e1a1569adfd25aa8f77e317bc8b6ef39437
-
SSDEEP
768:a8SEfX182epNZfnQuh7svIxdV6B5vKiCV/P4:jPu2epjXh7MBU55A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c72fc611c46167ae4885079c7172a423
Files
-
c72fc611c46167ae4885079c7172a423.sys windows:4 windows x86 arch:x86
28773e9e0fde98cd5094ae37ed1dee41
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwClose
ZwCreateSection
ZwCreateFile
RtlInitUnicodeString
MmIsAddressValid
PsTerminateSystemThread
wcscat
wcscpy
_stricmp
strncpy
KeInitializeTimer
IofCompleteRequest
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
swprintf
ZwUnmapViewOfSection
ZwCreateKey
RtlAnsiStringToUnicodeString
MmGetSystemRoutineAddress
PsGetVersion
_wcslwr
wcsncpy
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 160B - Virtual size: 130B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 736B - Virtual size: 730B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 928B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 768B - Virtual size: 742B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ