D:\Ebatoria\Projects\RevolWare\x64\Release\RWKM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
RWKM.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
RWKM.sys
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
termdd.dll
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
unloadDriver.bat
Resource
win10-20240404-en
General
-
Target
zib.zip
-
Size
2.5MB
-
MD5
6706be82bc4a8c2c0287f180cc536901
-
SHA1
ff62bc776c94cd2cf8a6d402d4cf430fbc9645c0
-
SHA256
c5bfe01576713239de3370e83b4662b3c924f29f56a38d03e1490c3b34bb4bc8
-
SHA512
9eac612cb179b5e3ab862fa693dd92c86f80c18db2a9b3f61d68104fe499e2d5d6d89c4b9b5bad1ce0f99f6796f62d6e2c074df3c6e22494916dba72bb9280a1
-
SSDEEP
49152:D9sbXeHFLa8tOdQDfAD8AwEAHDUTDkHXa/keds/2:Rxg8qQbgGHDEoKFds/2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/RWKM.exe
Files
-
zib.zip.zip
-
RWKM.exe.exe windows:6 windows x64 arch:x64
1d556f58539312b7d7ec82e68b2e6088
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
d3d9
Direct3DCreate9Ex
d3dx9_43
D3DXMatrixTranspose
D3DXVec3Transform
dwmapi
DwmExtendFrameIntoClientArea
ntdll
RtlAdjustPrivilege
RtlInitUnicodeString
RtlPcToFileHeader
NtLoadDriver
NtQuerySystemInformation
RtlWriteRegistryValue
RtlNtStatusToDosError
RtlCompareMemory
RtlVirtualUnwind
RtlCaptureContext
NtUnloadDriver
RtlLookupFunctionEntry
RtlCreateRegistryKey
RtlUnwind
RtlUnwindEx
shlwapi
SHDeleteKeyW
kernel32
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
GetFileType
EnumSystemLocalesW
Sleep
DeviceIoControl
GetTickCount64
MultiByteToWideChar
GlobalAlloc
GlobalFree
GlobalLock
WideCharToMultiByte
GlobalUnlock
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
FreeLibrary
QueryPerformanceCounter
SetLastError
GetFullPathNameW
GetSystemDirectoryW
VirtualQuery
LoadLibraryExW
CreateFileA
CreateThread
GetConsoleWindow
SetConsoleOutputCP
Process32First
SetConsoleTextAttribute
GetStdHandle
CreateToolhelp32Snapshot
GetLastError
Process32Next
CloseHandle
GetFileSizeEx
ReadFile
HeapAlloc
HeapReAlloc
GetACP
GetProcessHeap
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCommandLineW
GetCommandLineA
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RaiseException
InitializeSListHead
GetCurrentProcessId
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetStringTypeW
GetOEMCP
SetEndOfFile
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
CreateFileW
HeapSize
WriteConsoleW
HeapFree
WaitForSingleObject
GetConsoleOutputCP
FlushFileBuffers
GetModuleHandleW
ReadConsoleW
GetConsoleMode
GetCurrentThreadId
WaitForSingleObjectEx
GetExitCodeThread
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
SetFilePointerEx
user32
GetWindow
DispatchMessageA
DestroyWindow
SetWindowPos
ShowWindow
SetWindowLongA
DefWindowProcA
CreateWindowExA
TranslateMessage
LoadIconA
PeekMessageA
RegisterClassExA
UpdateWindow
SetForegroundWindow
LoadCursorA
ScreenToClient
EnumWindows
ClientToScreen
IsChild
GetForegroundWindow
SetCapture
SetCursor
GetClientRect
ReleaseCapture
SetCursorPos
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
GetKeyState
GetKeyboardState
GetAsyncKeyState
mouse_event
GetWindowThreadProcessId
GetCapture
imm32
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RWKM.sys.sys windows:10 windows x64 arch:x64
6c3a085ea0e27af17ec74009a5939543
Code Sign
78:47:ee:ef:db:42:7f:a0:45:0f:14:77:79:99:02:21Certificate
IssuerCN=WDKTestCert romal\,133012794520847836Not Before02/07/2022, 23:50Not After03/07/2032, 00:00SubjectCN=WDKTestCert romal\,133012794520847836Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
bc:d5:fc:75:ef:63:58:eb:8b:dd:54:2a:57:d5:62:44:a1:98:44:c7Signer
Actual PE Digestbc:d5:fc:75:ef:63:58:eb:8b:dd:54:2a:57:d5:62:44:a1:98:44:c7Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
D:\Ebatoria\Projects\RevolWare\x64\Release\RWKM.pdb
Imports
ntoskrnl.exe
IofCompleteRequest
PsLookupProcessByProcessId
wcsstr
ProbeForRead
ProbeForWrite
IoGetCurrentProcess
KeStackAttachProcess
KeUnstackDetachProcess
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
MmCopyVirtualMemory
__C_specific_handler
RtlInitUnicodeString
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 646B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
objects.list
-
termdd.sys.dll windows:6 windows x64 arch:x64
e73d3f83260a4e815c70360018ea4c1f
Code Sign
61:04:b3:f5:00:00:00:00:00:0dCertificate
IssuerCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before25/07/2008, 19:13Not After25/07/2011, 19:23SubjectCN=Microsoft Time-Stamp Service,OU=MOPR+OU=nCipher DSE ESN:9E78-864B-039D,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
61:15:23:0f:00:00:00:00:00:0aCertificate
IssuerCN=Microsoft Windows Verification PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before07/12/2009, 21:57Not After07/03/2011, 21:57SubjectCN=Microsoft Windows,OU=MOPR,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
61:16:68:34:00:00:00:00:00:1cCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before03/04/2007, 12:53Not After03/04/2021, 13:03SubjectCN=Microsoft Time-Stamp PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
61:07:02:dc:00:00:00:00:00:0bCertificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before15/09/2005, 21:55Not After15/03/2016, 22:05SubjectCN=Microsoft Windows Verification PCA,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
e9:1d:27:a2:a0:39:ca:8f:55:cc:01:ae:81:b2:85:a9:9d:6d:64:20Signer
Actual PE Digeste9:1d:27:a2:a0:39:ca:8f:55:cc:01:ae:81:b2:85:a9:9d:6d:64:20Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
termdd.pdb
Imports
ntoskrnl.exe
KeInitializeEvent
ZwLoadDriver
IoGetDeviceObjectPointer
ZwUnloadDriver
IoBuildDeviceIoControlRequest
ObfDereferenceObject
ObfReferenceObject
IofCallDriver
KeWaitForSingleObject
ExEnterCriticalRegionAndAcquireResourceExclusive
ExReleaseResourceAndLeaveCriticalRegion
MmSizeOfMdl
KeAcquireSpinLockRaiseToDpc
KeReleaseSpinLock
IoInitializeIrp
memchr
IofCompleteRequest
ProbeForWrite
ExIsResourceAcquiredExclusiveLite
IoAcquireCancelSpinLock
IoReleaseCancelSpinLock
IoGetRequestorProcess
IoGetCurrentProcess
MmMapLockedPagesSpecifyCache
KeSetEvent
PsGetCurrentProcessId
_stricmp
ExInitializeResourceLite
ExDeleteResourceLite
ZwDeviceIoControlFile
ObReferenceObjectByHandle
IoFileObjectType
RtlLengthRequiredSid
RtlSubAuthoritySid
RtlInitializeSid
SeQueryInformationToken
RtlEqualSid
ExAllocatePoolWithQuotaTag
MmUserProbeAddress
IoCreateDevice
_vsnwprintf
RtlInitUnicodeString
RtlQueryRegistryValues
KeClearEvent
IoGetRequestorProcessId
ExEnterCriticalRegionAndAcquireResourceShared
ExReleaseResourceLite
ExAcquireResourceExclusiveLite
KeDelayExecutionThread
KeWaitForMultipleObjects
IoAllocateErrorLogEntry
IoWriteErrorLogEntry
PsCreateSystemThread
ExQueueWorkItem
DbgPrint
ZwQuerySystemInformation
ExEventObjectType
ZwClose
KeInitializeTimer
KeInitializeDpc
KeSetTimer
KeCancelTimer
RtlInitializeGenericTable
RtlEnumerateGenericTable
RtlDeleteElementGenericTable
RtlInsertElementGenericTable
RtlLookupElementGenericTable
IoStartPacket
IoSetStartIoAttributes
IoStartNextPacket
IoCreateController
IoDeleteController
IoAttachDeviceToDeviceStack
ExAcquireFastMutexUnsafe
ExReleaseFastMutexUnsafe
IoWMIRegistrationControl
IoDetachDevice
IoInvalidateDeviceState
PoStartNextPowerIrp
PoCallDriver
PoSetPowerState
KeReadStateEvent
KeBugCheckEx
ExFreePoolWithTag
IoDeleteDevice
ExAllocatePoolWithTag
__C_specific_handler
wmilib.sys
WmiSystemControl
WmiCompleteRequest
Exports
Exports
IcaAllocateWorkItem
IcaAssertStackLockedExclusive
IcaBreakOnDebugger
IcaBufferAlloc
IcaBufferAllocEx
IcaBufferError
IcaBufferFree
IcaBufferGetUsableSpace
IcaCallNextDriver
IcaChannelInput
IcaCloseHandle
IcaCreateHandle
IcaCreateThread
IcaFlowControlSleep
IcaFlowControlWait
IcaGetSizeForNoLowWaterMark
IcaLogError
IcaLogErrorEx
IcaQueueWorkItem
IcaQueueWorkItemEx
IcaRawInput
IcaReturnHandle
IcaSleep
IcaStackAllocatePool
IcaStackAllocatePoolWithTag
IcaStackFreePool
IcaStackTrace
IcaStackTraceBuffer
IcaSystemTrace
IcaSystemTraceBuffer
IcaTimerCancel
IcaTimerClose
IcaTimerCreate
IcaTimerStart
IcaWaitForMultipleObjects
IcaWaitForSingleObject
IcaZwClose
OutBufTracker
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PAGE Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
unloadDriver.bat