Static task
static1
General
-
Target
ca5078f87870a4a7eb0cba16cbc8c814
-
Size
20KB
-
MD5
ca5078f87870a4a7eb0cba16cbc8c814
-
SHA1
ac4be6812e201cfb616745526c9fd80e1a3bb666
-
SHA256
3374ca86af7769e6dbba945249dcfaa11afd228ee6531c0027ffaf27ff51f65b
-
SHA512
ce170595c12f85c3a6e77582dec21a0a7b2207f08bc36d1d61405744f6dbb7b1461596a901f6841f4019d879c66e7387c511bf71ac77e3f8b61dfbfc9859c9f6
-
SSDEEP
96:ZS2CnoSu/1L0LvFPvg/otysrH/s58gYZPSr4phqBjuHfWRn7NmdrgGt/4uaVMoi+:k2CnA1+vOoz/ZPSrYheEiNm+GtDIBH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca5078f87870a4a7eb0cba16cbc8c814
Files
-
ca5078f87870a4a7eb0cba16cbc8c814.sys windows:5 windows x86 arch:x86
0aacc2b50ecc7315cd3ce4d862d7e57d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
MmIsAddressValid
RtlFreeAnsiString
_strupr
RtlUnicodeStringToAnsiString
strncmp
IoGetCurrentProcess
strrchr
PsGetCurrentThreadId
PsGetCurrentProcessId
strstr
PsLookupProcessByProcessId
strncpy
RtlInitUnicodeString
KeServiceDescriptorTable
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwReadFile
ZwClose
ZwCreateFile
ExFreePool
ExAllocatePoolWithTag
IoCreateSymbolicLink
IoCreateDevice
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 224B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 96B - Virtual size: 67B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 736B - Virtual size: 716B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 480B - Virtual size: 450B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ