Static task
static1
General
-
Target
cbd5202442791533a40ba65d312e5660N.exe
-
Size
40KB
-
MD5
cbd5202442791533a40ba65d312e5660
-
SHA1
1e1a10a2085ac019fd57cc594628fee60f571b6f
-
SHA256
4c1a2c52b1ca236862ecc92bce202139b147bd3188dac1e35af2727a18c51b27
-
SHA512
c393c90748324eab036d9b8f8993f84ed25e50062155734299fbe6e5ebfa06b6825c5aa96780c2c37278bbb5e102202d898c60d4afe2c38a7cf8ced34a26c3ae
-
SSDEEP
768:7f5Fvrc5aB+OvcKVc/7V2eIPOge/tMMRn3SarmMysPBfcerZYlj12D7:99cUvVVSV2/OgeFMUiassJf9D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cbd5202442791533a40ba65d312e5660N.exe
Files
-
cbd5202442791533a40ba65d312e5660N.exe.sys windows:4 windows x86 arch:x86
dfa3c4696f8914e124f50ad034b7ac37
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwQueryValueKey
RtlInitUnicodeString
ObReferenceObjectByHandle
_wcsnicmp
wcslen
MmIsAddressValid
KeDelayExecutionThread
KeQuerySystemTime
ZwSetValueKey
ZwSetInformationFile
ZwCreateFile
wcscpy
swprintf
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
PsGetVersion
ZwCreateKey
strncpy
PsLookupProcessByProcessId
_stricmp
KeTickCount
KeQueryTimeIncrement
IoDeviceObjectType
wcsstr
_wcslwr
_wcsicmp
wcsncpy
wcsrchr
ZwOpenKey
_except_handler3
strncmp
RtlAnsiStringToUnicodeString
_snwprintf
ExAllocatePoolWithTag
wcschr
IoGetCurrentProcess
MmGetSystemRoutineAddress
RtlCompareUnicodeString
ObfDereferenceObject
wcscat
PsSetCreateProcessNotifyRoutine
RtlCopyUnicodeString
IoRegisterDriverReinitialization
ExFreePool
PsCreateSystemThread
ZwDeleteKey
_snprintf
IofCompleteRequest
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 64B - Virtual size: 43B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ