d:\winddk\3790~1.183\antivirus\objfre_wxp_x86\i386\kiss.pdb
Static task
static1
General
-
Target
e09346a366c37686f823013d44cb2029
-
Size
4KB
-
MD5
e09346a366c37686f823013d44cb2029
-
SHA1
4440abf7f9c4c808a558739aa88083e8f453b111
-
SHA256
6ddd7d7150769e8d17b907b9368eee6f027e062aaaa93eaa0e581fd9f80ce383
-
SHA512
43266f1120db3c0efbeda0e1f6bc56ae23d21de67b7f9860ba643dca728b2dda9c5e86433a3cdc81c0a749cc5053ed59cda8b3d17aff094df1c714037ae735b3
-
SSDEEP
96:2BWkdNIjFV6lRu1ag4BmUF8pctqi7oxN5exWPr5vlF:JvulRHBMUOpTisxN5exa7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e09346a366c37686f823013d44cb2029
Files
-
e09346a366c37686f823013d44cb2029.sys windows:5 windows x86 arch:x86
bbf427ff5e47fd3333c85ac3bc84887e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ExFreePoolWithTag
ExAllocatePoolWithTag
ZwQuerySystemInformation
ObfDereferenceObject
ObfReferenceObject
PsLookupProcessByProcessId
KeWaitForSingleObject
KeInitializeEvent
DbgPrint
RtlCompareUnicodeString
RtlInitUnicodeString
PsTerminateSystemThread
ZwClose
ObReferenceObjectByHandle
PsCreateSystemThread
KeSetEvent
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 698B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 242B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ