Static task
static1
General
-
Target
cc72f576750f537c56bd83b88528a220
-
Size
49KB
-
MD5
cc72f576750f537c56bd83b88528a220
-
SHA1
913bc36cb838bf7c0689229b13a4b2b277567c3c
-
SHA256
1135c5515d891f319f5840d2a072e80bf45d18a2325fe61d4fae283522ca4e1a
-
SHA512
1c6944b421c5069b93a4a8348d2a604bd31f5a3af237d679fde7005e0c7ddfa106e504309afff37f71e7db30600312fe812966e4ac7253099feb392c700ac62f
-
SSDEEP
1536:bQDlAkrK9pCeOBnbt++HHwr6HkySZaaJhrM6gxD5um9FPz63yO02ezmIO:SOAuE2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cc72f576750f537c56bd83b88528a220
Files
-
cc72f576750f537c56bd83b88528a220.sys windows:4 windows x86 arch:x86
11a9611deb5ddf3a1579628445a68b58
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
RtlInitUnicodeString
wcscat
wcscpy
MmGetSystemRoutineAddress
RtlAnsiStringToUnicodeString
ZwClose
ZwCreateKey
swprintf
MmIsAddressValid
ZwUnmapViewOfSection
ZwCreateFile
PsTerminateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
PsGetVersion
_wcslwr
wcsncpy
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 160B - Virtual size: 156B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 768B - Virtual size: 764B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 928B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 736B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ