c:\Kernel Detective\Application\GM\Bin\Kernel Detective.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e0c9f1179171433ad0e8735648cae78f1f8258b1197ed05260827309a7d53c63.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0c9f1179171433ad0e8735648cae78f1f8258b1197ed05260827309a7d53c63.exe
Resource
win10v2004-20240508-en
General
-
Target
e0c9f1179171433ad0e8735648cae78f1f8258b1197ed05260827309a7d53c63
-
Size
727KB
-
MD5
52bdf90dd5d9d2ec1af78ae45d19bc2b
-
SHA1
d7843a09d537737cea6730935f2d04aaf6e3381c
-
SHA256
e0c9f1179171433ad0e8735648cae78f1f8258b1197ed05260827309a7d53c63
-
SHA512
2a241a3393b53f07b0df14f488607a804665bd4575f343a53a35b529956d5012515057aedc2027193e511f089dfc614af69c5faaa3e93f956d979e8d1902b35f
-
SSDEEP
12288:eVbQFyGqdiCV1OtuyZ3FKrHs3H5t5Kz3HbonyyCA4i6iNNYIz+l0fA:eAyNgCfwuyZ3FKrHs3H5tMLUyyBz6tgI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e0c9f1179171433ad0e8735648cae78f1f8258b1197ed05260827309a7d53c63
Files
-
e0c9f1179171433ad0e8735648cae78f1f8258b1197ed05260827309a7d53c63.exe windows:5 windows x86 arch:x86
4bcd53920522c3cdec5f87bcff7941a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
PDB Paths
Imports
comctl32
ord17
ImageList_Create
ImageList_ReplaceIcon
CreateStatusWindowW
ImageList_SetBkColor
ImageList_Destroy
kernel32
GetExitCodeThread
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
GlobalLock
GlobalAlloc
GetSystemDirectoryW
WideCharToMultiByte
GlobalUnlock
GetLastError
QueryDosDeviceW
GetWindowsDirectoryW
ExpandEnvironmentStringsW
GetSystemInfo
GetCommandLineW
CreateMutexW
GetCurrentProcess
GetTickCount
GetModuleFileNameW
DeleteFileW
GetCurrentProcessId
GetCurrentThread
GetVersionExW
lstrlenW
DeviceIoControl
SetThreadAffinityMask
FindFirstFileW
FreeLibrary
IsBadReadPtr
LoadLibraryW
IsBadWritePtr
FindClose
FindNextFileW
OpenProcess
TerminateProcess
WritePrivateProfileStringW
GetPrivateProfileIntW
GetCurrentDirectoryW
LoadLibraryA
Thread32First
TerminateThread
Thread32Next
OpenThread
CreateToolhelp32Snapshot
InitializeCriticalSection
SizeofResource
GetProcAddress
CreateFileA
GetModuleHandleA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RaiseException
HeapSize
GetModuleFileNameA
GetStdHandle
ExitProcess
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
HeapCreate
LCMapStringW
MultiByteToWideChar
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetProcessHeap
Sleep
CreateRemoteThread
GetModuleHandleW
CreateThread
CloseHandle
GetCurrentThreadId
GetLocalTime
LockResource
SetThreadPriority
CreateFileW
FlushFileBuffers
IsBadCodePtr
WriteFile
LoadResource
FindResourceW
FindResourceExW
SetEndOfFile
SetFilePointer
FileTimeToSystemTime
VirtualFree
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetStartupInfoA
GetCommandLineA
HeapReAlloc
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapAlloc
HeapFree
user32
GetDlgItem
SetWindowLongW
GetWindowLongW
InvalidateRect
DestroyWindow
GetCursorPos
LoadMenuW
GetSubMenu
CreateWindowExW
SetTimer
SetWindowTextW
DestroyMenu
SetDlgItemTextW
GetDlgItemTextW
GetSystemMetrics
MessageBoxW
UnhookWindowsHookEx
SetWindowsHookExW
GetMenuItemCount
CreateDialogParamW
CreatePopupMenu
ShowWindow
SendMessageW
CallWindowProcW
MoveWindow
TrackPopupMenu
CheckDlgButton
GetParent
DestroyIcon
PostMessageW
CloseClipboard
wsprintfW
EmptyClipboard
OpenClipboard
SetClipboardData
GetWindowTextLengthW
IsDlgButtonChecked
GetDlgItemTextA
SetMenuItemInfoW
SetDlgItemTextA
TranslateAcceleratorW
GetMenuItemID
DialogBoxParamW
CallNextHookEx
GetClientRect
SetFocus
LoadAcceleratorsW
GetMenu
LoadIconW
AppendMenuW
GetClassNameW
EnableMenuItem
EndDialog
SendDlgItemMessageW
SetWindowPos
gdi32
CreateFontW
SetTextColor
SetBkMode
DeleteObject
SelectObject
CreateSolidBrush
SetBkColor
comdlg32
GetSaveFileNameW
GetOpenFileNameW
ChooseColorW
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
OpenProcessToken
shell32
ShellExecuteExW
SHGetFileInfoW
CommandLineToArgvW
ShellExecuteW
ole32
CoCreateGuid
dbghelp
SymEnumSymbolsW
SymFunctionTableAccess64
SymInitializeW
SymGetSymFromAddr64
SymCleanup
SymUnloadModule64
SymGetModuleInfoW64
SymSetOptions
MiniDumpWriteDump
SymGetModuleInfoW
SymLoadModule64
SymGetModuleBase64
StackWalk64
shlwapi
SHDeleteKeyW
psapi
EnumDeviceDrivers
GetDeviceDriverBaseNameW
wintrust
CryptCATAdminReleaseCatalogContext
WinVerifyTrust
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminAcquireContext
imagehlp
UnMapAndLoad
MapAndLoad
Sections
.text Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 417KB - Virtual size: 417KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ