DrmkAud.pdb
Static task
static1
General
-
Target
77dee279abaac8d8450a1386ea9da097
-
Size
22KB
-
MD5
77dee279abaac8d8450a1386ea9da097
-
SHA1
269d905a8f301b94aebf1ea0b6d73374b6233332
-
SHA256
7428a4556fe24478bb86c6ab79f8b0c19802187e2e4da44f388344539bf17134
-
SHA512
ad57cfb7d7f5df932c0ec62045c7362c2f557100e1131f9ee294626f5f4525ea425d803129649f38d73039d71eb6c86cf6cb993e962ac90f46fcabc5005bfba5
-
SSDEEP
384:cEWO8Y8rDwW2F+lsr3hJXQeMripAcFsSWK8Tb4qSzcLFUTBzrtNNN0xfm9MWO8YS:WBri+lsTDXQjCAcK3Tb6zcLEXtN8IBr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 77dee279abaac8d8450a1386ea9da097
Files
-
77dee279abaac8d8450a1386ea9da097.sys windows:5 windows x86 arch:x86
b74d4eb22616be4fe59a51be7e0d2691
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
KeTickCount
ks.sys
KsInitializeDriver
drmk.sys
DrmGetFilterDescriptor
Sections
.text Size: 128B - Virtual size: 12B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 128B - Virtual size: 50B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 384B - Virtual size: 274B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fejo Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 128B - Virtual size: 46B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ