C:\Users\Avxy\Desktop\inj\injector#\driver\x64\Release\KernelCheatKM.pdb
Static task
static1
Behavioral task
behavioral1
Sample
km.sys
Resource
win10v2004-20240508-en
General
-
Target
km.sys
-
Size
34KB
-
MD5
1039c2a64d2afe2c2aac6ea456043360
-
SHA1
39d98a7549df0a6885a0022390b87849a72f1bce
-
SHA256
a1151bcab6d937c9197fde5fdf5143d70625e1543e30b6f40a82b943768faf9b
-
SHA512
4e2663c95523d4f88bc8b45d4128a75a372472992ba746ba1c1410fd9948c4809413aae7a937b0e2cfc8baaad2324e0f4bdc9dec99a0ff0a04249246a3910839
-
SSDEEP
192:27fYVezjclTex5FLm9GJAEzRTrtmJ54BpeQpxYcblkpAdPFcgv6Vk:iAVeXclTym9GJHlBQUT35rdtcj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource km.sys
Files
-
km.sys.sys windows:10 windows x64 arch:x64
8408e25f7d8999014e792a6fbab5280e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntoskrnl.exe
RtlInitAnsiString
MmGetSystemRoutineAddress
DbgPrintEx
ExAllocatePoolWithTag
ExFreePoolWithTag
ExAcquireResourceExclusiveLite
ExReleaseResourceLite
PsTerminateSystemThread
RtlDeleteElementGenericTableAvl
RtlLookupElementGenericTableAvl
RtlCompareString
ZwQuerySystemInformation
RtlImageNtHeader
MmIsAddressValid
DbgPrint
MmProbeAndLockPages
MmUnlockPages
MmProtectMdlSystemAddress
MmMapLockedPagesSpecifyCache
MmUnmapLockedPages
IoAllocateMdl
IoFreeMdl
IoGetCurrentProcess
ObfDereferenceObject
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
ObOpenObjectByPointer
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
ZwProtectVirtualMemory
RtlFindExportedRoutineByName
MmCopyVirtualMemory
PsProcessType
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ