Static task
static1
General
-
Target
df7868a980a549b2cb8a8bf178f85aa2
-
Size
8KB
-
MD5
df7868a980a549b2cb8a8bf178f85aa2
-
SHA1
87a28dfd2dfeedfb37648642bea4f3fba1e618d0
-
SHA256
4a08d933ae19f859fe84bad876f609b3ae441355cccfb6bba23a998c0ac41493
-
SHA512
a98e6ff1d67b3d65f80615df1540469db148ef532754d6bc3413d97712f156ba4f51c72558b14bc48cdd8bf8462df0514bdffebe8f68cb52c751e5ad74f7e025
-
SSDEEP
96:N2E1a/CM3+NJcVDxc7RDnAQemwNk/jizthNnkq+hnXhKTeqhSJjJn:N2j5Zk71njyk+BhLN3hA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df7868a980a549b2cb8a8bf178f85aa2
Files
-
df7868a980a549b2cb8a8bf178f85aa2.sys windows:5 windows x86 arch:x86
245513abec75b4f07103d2c43a8e9efe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memcpy
IoDeleteSymbolicLink
PsLookupProcessByProcessId
RtlInitUnicodeString
IoDeleteDevice
PsTerminateSystemThread
IofCompleteRequest
PsGetVersion
KeServiceDescriptorTable
IoCreateSymbolicLink
ObfDereferenceObject
IoCreateDevice
ObReferenceObjectByPointer
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ