C:\Users\thega\Desktop\injector#\driver\x64\Release\KernelCheatKM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
backdoorkm.sys
Resource
win10v2004-20240419-en
General
-
Target
backdoorkm.sys
-
Size
12KB
-
MD5
5473c049f7508a9c4ed0098548cce714
-
SHA1
ffe3952f27064432ed469ef671f182b5acf22091
-
SHA256
336f56f019a6272e8fddea0a1eeb00e4cb7d95640853b9287d9b93b26a5ddd56
-
SHA512
3ac9c7cf8de83e7abbde65e316f5704c9708438d431cff6cfe1b7226e346a4fc97ac00ff386f77e7077f117d75fdf16d4b51df9f1f475de862aa2825e39807f8
-
SSDEEP
192:HO4tIzjcMTesU2iyDvO4ctze8lh5JyCQeh2JYcbFkZC0p7K1k:HLtIXcMTNiyDvO4q5lbJyhyq5EC0ZK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource backdoorkm.sys
Files
-
backdoorkm.sys.sys windows:10 windows x64 arch:x64
8408e25f7d8999014e792a6fbab5280e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntoskrnl.exe
RtlInitAnsiString
MmGetSystemRoutineAddress
DbgPrintEx
ExAllocatePoolWithTag
ExFreePoolWithTag
ExAcquireResourceExclusiveLite
ExReleaseResourceLite
PsTerminateSystemThread
RtlDeleteElementGenericTableAvl
RtlLookupElementGenericTableAvl
RtlCompareString
ZwQuerySystemInformation
RtlImageNtHeader
MmIsAddressValid
DbgPrint
MmProbeAndLockPages
MmUnlockPages
MmProtectMdlSystemAddress
MmMapLockedPagesSpecifyCache
MmUnmapLockedPages
IoAllocateMdl
IoFreeMdl
IoGetCurrentProcess
ObfDereferenceObject
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
ObOpenObjectByPointer
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
ZwProtectVirtualMemory
RtlFindExportedRoutineByName
MmCopyVirtualMemory
PsProcessType
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ