Static task
static1
General
-
Target
c86bf83a41d14a8214bef7e9150232cb
-
Size
27KB
-
MD5
c86bf83a41d14a8214bef7e9150232cb
-
SHA1
c2199681ce1acb8c2e6d5f66c33693a76f3e3da1
-
SHA256
897b12a5f987827aca5c72703a0b9f257c46cbd2712ef93bb4e98a302c1acb75
-
SHA512
e0693395231b49c1c35983b33ab7b2c514ff98ff3ba4c07c719ed6fc06e1264dd91e9fe17bf8407d26298b0aef63e9e7f14d4cd517e2f1eed00f332d024ca38a
-
SSDEEP
768:YYerNFjcpB/79YOx03TPULnryE8nFBJvbJB3qU5qB:DerCPAJDv5qB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c86bf83a41d14a8214bef7e9150232cb
Files
-
c86bf83a41d14a8214bef7e9150232cb.sys windows:5 windows x86 arch:x86
d78bad0c35624eb1b5873b496d56b64f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
_except_handler3
_strnicmp
IofCompleteRequest
IoGetCurrentProcess
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
ExGetPreviousMode
KeServiceDescriptorTable
ZwSetValueKey
PsGetVersion
ZwCreateFile
IoRegisterDriverReinitialization
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
wcscat
wcscpy
PsCreateSystemThread
ZwDeleteValueKey
KeDelayExecutionThread
ExFreePool
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ExAllocatePoolWithTag
ZwQueryInformationFile
wcsncmp
wcslen
towlower
_wcsnicmp
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
wcsstr
strncmp
strncpy
ZwEnumerateKey
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 800B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ