Static task
static1
Behavioral task
behavioral1
Sample
chkntfs.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
chkntfs.exe
Resource
win10v2004-20231023-en
General
-
Target
chkntfs.exe
-
Size
20KB
-
MD5
ba7c36f4b1c9f18eba3bc775d314e9d8
-
SHA1
2a7e7fadd7b4739480a6bcd4b1a0097e8109aeca
-
SHA256
2ab0926859fe6dc6308afb90a55fd044641ec5b948d8f4bfd77c854b24670719
-
SHA512
7173ee70385d35880693370a1e38aec91c7de1974745f544426d7adf815dfa1963797c62f00c10ad2753a350ae4add6dbf3fc51cf934b9bdbe7dfc5e71192aa6
-
SSDEEP
384:7vojfDOksUtaJAfVAVJuu016WI2uub+khAUL5a2NsWE6W:MTDVaBJuN16WIgbjhA0Dk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource chkntfs.exe
Files
-
chkntfs.exe.exe windows:6 windows x64
a778ee2a43f974cf68a13581a5fafe96
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
kernel32
SetErrorMode
GetCurrentProcess
GetVersionExW
GetLastError
HeapSetInformation
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
msvcrt
_initterm
__setusermatherr
_cexit
_exit
__set_app_type
__getmainargs
_amsg_exit
_XcptFilter
?terminate@@YAXXZ
_commode
_fmode
exit
__C_specific_handler
ulib
?DisplayMessage@PROGRAM@@UEBAEKW4MESSAGE_TYPE@@PEADZZ
??1PROGRAM@@UEAA@XZ
?Initialize@PROGRAM@@QEAAEKKK@Z
?Initialize@MULTIPLE_PATH_ARGUMENT@@QEAAEPEADEE@Z
??1MULTIPLE_PATH_ARGUMENT@@UEAA@XZ
?ValidateVersion@PROGRAM@@UEBAXKK@Z
?Put@ARRAY@@UEAAEPEAVOBJECT@@@Z
?Initialize@ARRAY@@QEAAEKK@Z
??1ARRAY@@UEAA@XZ
??0ARRAY@@QEAA@XZ
?Initialize@STRING_ARGUMENT@@QEAAEPEAD@Z
??1STRING_ARGUMENT@@UEAA@XZ
??0STRING_ARGUMENT@@QEAA@XZ
?QueryDriveType@SYSTEM@@SA?AW4DRIVE_TYPE@@PEBVWSTRING@@@Z
??8WSTRING@@QEBAEAEBV0@@Z
?DisplayMessage@PROGRAM@@UEBAEKW4MESSAGE_TYPE@@@Z
??0PROGRAM@@IEAA@XZ
?GetLexeme@ARGUMENT@@QEAAPEAVWSTRING@@XZ
?IsValueSet@ARGUMENT@@QEAAEXZ
?Initialize@WSTRING@@QEAAEPEBDK@Z
?Initialize@WSTRING@@QEAAEPEBV1@KK@Z
?QueryString@WSTRING@@QEBAPEAV1@KK@Z
?Strcat@WSTRING@@QEAAEPEBV1@@Z
??0LONG_ARGUMENT@@QEAA@XZ
?Initialize@LONG_ARGUMENT@@QEAAEPEAD@Z
??0FLAG_ARGUMENT@@QEAA@XZ
?Initialize@FLAG_ARGUMENT@@QEAAEPEAD@Z
??0DSTRING@@QEAA@XZ
??1DSTRING@@UEAA@XZ
??0PATH@@QEAA@XZ
??1PATH@@UEAA@XZ
?AnalyzePath@PATH@@QEAA?AW4PATH_ANALYZE_CODE@@PEAVWSTRING@@PEAV1@0@Z
??1OBJECT@@UEAA@XZ
?Compare@OBJECT@@UEBAJPEBV1@@Z
?Fatal@PROGRAM@@UEBAXKKPEADZZ
?Fatal@PROGRAM@@UEBAXXZ
?GetStandardInput@PROGRAM@@UEAAPEAVSTREAM@@XZ
?Usage@PROGRAM@@UEBAXXZ
?GetStandardError@PROGRAM@@UEAAPEAVSTREAM@@XZ
??0CLASS_DESCRIPTOR@@QEAA@XZ
?Initialize@CLASS_DESCRIPTOR@@QEAAEXZ
??0ARGUMENT_LEXEMIZER@@QEAA@XZ
??1ARGUMENT_LEXEMIZER@@UEAA@XZ
?Initialize@ARGUMENT_LEXEMIZER@@QEAAEPEAVARRAY@@@Z
?DoParsing@ARGUMENT_LEXEMIZER@@QEAAEPEAVARRAY@@@Z
?PutSeparators@ARGUMENT_LEXEMIZER@@QEAAXPEBD@Z
?PutSwitches@ARGUMENT_LEXEMIZER@@QEAAXPEBD@Z
?PrepareToParse@ARGUMENT_LEXEMIZER@@QEAAEPEAVWSTRING@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QEAAXE@Z
??0MULTIPLE_PATH_ARGUMENT@@QEAA@XZ
?GetStandardOutput@PROGRAM@@UEAAPEAVSTREAM@@XZ
ifsutil
??0DP_DRIVE@@QEAA@XZ
?SetAutochkTimeOut@VOL_LIODPDRV@@SAEK@Z
?QueryAutochkTimeOut@VOL_LIODPDRV@@SAEPEAK@Z
?Initialize@MOUNT_POINT_MAP@@QEAAEXZ
??1MOUNT_POINT_MAP@@UEAA@XZ
??0MOUNT_POINT_MAP@@QEAA@XZ
??1DP_DRIVE@@UEAA@XZ
?IsFrontEndPresent@AUTOREG@@SAEPEBVWSTRING@@0@Z
?DeleteEntry@AUTOREG@@SAEPEBVWSTRING@@E@Z
?DeleteEntry@AUTOREG@@SAEPEBVWSTRING@@0@Z
?PushEntry@AUTOREG@@SAEPEBVWSTRING@@@Z
?AddEntry@AUTOREG@@SAEPEBVWSTRING@@@Z
?IsVolumeDirty@IFS_SYSTEM@@SAEPEAVWSTRING@@PEAE1PEAJ@Z
?DosDriveNameToNtDriveName@IFS_SYSTEM@@SAEPEBVWSTRING@@PEAV2@@Z
??0MOUNT_POINT_TUPLE@@QEAA@XZ
?Initialize@DP_DRIVE@@QEAAEPEBVWSTRING@@PEAVMESSAGE@@EEG@Z
?QueryFileSystemName@IFS_SYSTEM@@SAEPEBVWSTRING@@PEAV2@PEAJ1@Z
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
RtlAllocateHeap
RtlFreeHeap
RtlVirtualUnwind
user32
ExitWindowsEx
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ