c:\winddk\7600.16385.1\wincor\wnbios1.2.0.0\amd64\wnBios.pdb
Static task
static1
Behavioral task
behavioral1
Sample
WNBIOS.sys
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
WNBIOS.sys
Resource
win10v2004-20240412-en
General
-
Target
WNBIOS.sys
-
Size
30KB
-
MD5
8f86e05716f5b2bae87704ec7e75bfc3
-
SHA1
528dae95fd1abbc5e3a51a20836bf38ebb371a35
-
SHA256
6106d1ce671b92d522144fcd3bc01276a975fe5d5b0fde09ca1cca16d09b7143
-
SHA512
f1b132a2f4dce6105d73067e3d4cc6007801f32e9999fd5dd6a8b8aefc4eea878466084fd08d4b17862309dcacdc30a4f7243ee99602e064d2151d993af3c319
-
SSDEEP
384:Te81Y0HertXQnYPLkSX5eMdbyFReblvQyw12tR/PdadGer2VA3/XE3uHLlK:r1YCStXQbXcvwAR/Pfi2ViXE3GLU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource WNBIOS.sys
Files
-
WNBIOS.sys.sys windows:6 windows x64 arch:x64
72374a1c4c0e0db4efcb1386f470a2f3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
IoDeleteDevice
MmFreeContiguousMemory
MmFreeNonCachedMemory
MmGetPhysicalAddress
ZwUnmapViewOfSection
ZwClose
IofCompleteRequest
ZwMapViewOfSection
IoCreateSymbolicLink
ObfDereferenceObject
MmAllocateNonCachedMemory
IoCreateDevice
ZwOpenSection
MmAllocateContiguousMemory
KeBugCheckEx
ObReferenceObjectByHandle
IoDeleteSymbolicLink
hal
HalTranslateBusAddress
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 388B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 810B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 960B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ