i:\myproject\sys\objfre_wxp_x86\i386\BreakIn.pdb
Static task
static1
General
-
Target
8965b16e7beeee21e6856c4ec936a1b0
-
Size
77KB
-
MD5
8965b16e7beeee21e6856c4ec936a1b0
-
SHA1
8074636c18166ac124029595b1fdad8fb3c4bc2c
-
SHA256
116ef16458b6210fe7235ddb134510e12d2cb6b3fb936a36d5c3bcab6d42cb02
-
SHA512
6eb70704eb6b5fa1d3e3a99b9d5ef549b2f4515f08c366e19f2f16a60bc460d074a079db8cdf58be6e70c8e82532337edf31f35e609b6a0a02b7fe88b62fd23d
-
SSDEEP
768:9QDjjc4YRgS4HHoKaDohddXEBwM3xzRfMpy0BF45sKfvCC:GokOup4pBzRk5T45s6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8965b16e7beeee21e6856c4ec936a1b0
Files
-
8965b16e7beeee21e6856c4ec936a1b0.sys windows:5 windows x86 arch:x86
79aa2c17d729fcfecbd64199bb1d0166
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
ZwClose
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
ZwQuerySymbolicLinkObject
wcscpy
ZwOpenSymbolicLinkObject
RtlInitUnicodeString
IoGetConfigurationInformation
IoGetDeviceObjectPointer
IoFreeIrp
IoFreeMdl
MmUnlockPages
DbgPrint
RtlImageDirectoryEntryToData
_except_handler3
ZwQuerySystemInformation
ExAllocatePoolWithTag
strstr
_strlwr
ObReferenceObjectByName
IoDriverObjectType
MmMapLockedPagesSpecifyCache
KeSetEvent
IoAllocateMdl
ZwTerminateProcess
KeServiceDescriptorTable
wcstombs
ProbeForRead
RtlRandom
KeTickCount
ExfInterlockedInsertTailList
IofCallDriver
KeGetCurrentThread
IoAllocateIrp
KeInitializeEvent
PsTerminateSystemThread
ExfInterlockedRemoveHeadList
KeSetPriorityThread
ObReferenceObjectByHandle
PsCreateSystemThread
KeInitializeSpinLock
IoCreateSymbolicLink
IoCreateDevice
swprintf
ZwMakeTemporaryObject
ZwCreateDirectoryObject
wcscat
KeBugCheckEx
KeWaitForSingleObject
ObfDereferenceObject
ExFreePoolWithTag
MmProbeAndLockPages
IoDeleteDevice
hal
KfRaiseIrql
KfLowerIrql
KeGetCurrentIrql
KeStallExecutionProcessor
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 768B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ