Static task
static1
General
-
Target
e1f7f1819b01c2886c71278fb46bfb63
-
Size
8KB
-
MD5
e1f7f1819b01c2886c71278fb46bfb63
-
SHA1
1b7154f8e7eb517f0d2fa06e471d3eced5bc8c84
-
SHA256
70c96927e492e7b2c4b993e22a4d2626591b1136283f8f309180082437e4f6fe
-
SHA512
722b9ba3c47313a6890b7209e8cdc5809955f8841e48c7ed72792314c5ed12f32e7046f1f6c904baef036aed0a2d7b3accd41b2995ff1b0f08925efbf89257ab
-
SSDEEP
192:/Su822rW2yxjSFSSXilYut5VvbhJNqdgFxTcwYDQBLurx7Q5BgVG:6u8DrrcJzvbhow49gKVG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1f7f1819b01c2886c71278fb46bfb63
Files
-
e1f7f1819b01c2886c71278fb46bfb63.sys windows:4 windows x86 arch:x86
662b196f3f15fe4e3f8f2e048548cc93
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ndis.sys
NdisGetCurrentSystemTime
NdisRegisterProtocol
ntoskrnl.exe
RtlInitUnicodeString
IoCreateDevice
IoCreateSymbolicLink
IofCompleteRequest
KeServiceDescriptorTable
MmIsAddressValid
IoGetCurrentProcess
PsLookupProcessByProcessId
ObDereferenceObject
IoGetDeviceObjectPointer
IoBuildDeviceIoControlRequest
PsGetCurrentProcessId
IoCreateFile
IofCallDriver
KeDisconnectInterrupt
ZwAllocateVirtualMemory
RtlCompareUnicodeString
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 352B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 624B - Virtual size: 622B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 688B - Virtual size: 686B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ