C:\Users\yuhgiuyg\Desktop\FNMAIN\build\hksdr2.pdb
Static task
static1
General
-
Target
driver.sys
-
Size
7KB
-
MD5
530eacdee815a3cbfa294af2602c1789
-
SHA1
14116538cf36b832fa6e71c9ae7700b1e4f14244
-
SHA256
782f7dfef7e0bb4bea572fcf38978eb16200c1b198aa7002f233bea58199bf3e
-
SHA512
70971eec912951478c4885a8cf9f11a239b8fb2e17b09ff277882d9c9743e6d93959c2d6ecbeea57879e41cb68f141704004c0c257979b4644bbc3cb121bf226
-
SSDEEP
96:5ST8ttUjs1raOkM34vFYdPL21Ose1egZqG6ccYZSI6dXHdTsgL9Zw7B:4Tqb1rabqL21O3egZumjmHLm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource driver.sys
Files
-
driver.sys.sys windows:10 windows x64 arch:x64
12c47c90a4b7fc6aa7033af75abbafb8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
RtlGetVersion
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ObfDereferenceObject
MmCopyMemory
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
IoCreateDriver
PsGetProcessSectionBaseAddress
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 512B - Virtual size: 492B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ