Static task
static1
General
-
Target
driver.sys
-
Size
7KB
-
MD5
55498ae5cad908320fbb21eef794cc4a
-
SHA1
1c6eca639562e76a0731d5a8de6d3a3d4a9a50b7
-
SHA256
76e222d49430cccafc1ef7bae52331167201dda032378eb899bd1419e438b203
-
SHA512
a0bee6c9de532b58e4e34d3a93e3fc90ac13f2e2c5ddefd49e3fc40b8c7c11787eb9e0eb5d4b24d2aa2de87546534339444b77bc4680a7d86c87b03282b47f3b
-
SSDEEP
48:SK9myoDn0Kokyzn+QhoJmS9DmY9wZVA1beW77WhIhTv5QdTuXoIeW1RLIFyAVCT2:r/oHokyz+bmDZVA16kTtYhaP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource driver.sys
Files
-
driver.sys.sys windows:10 windows x64 arch:x64
a7f039eec35ab460140e0a9ddf36c423
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
RtlInitUnicodeString
RtlCompareUnicodeString
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
IoGetCurrentProcess
ObfDereferenceObject
KeAttachProcess
KeDetachProcess
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
ZwAllocateVirtualMemory
MmCopyVirtualMemory
PsGetProcessPeb
IoCreateDriver
ZwProtectVirtualMemory
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 642B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ