C:\Users\jce\Downloads\gdrv_fix\gdrv fix\x64\Release\GDRVLoader.pdb
Static task
static1
Behavioral task
behavioral1
Sample
262e636e1017d908369407ee3bfa69bde9201e2c98c20c1d85334be633764057.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
262e636e1017d908369407ee3bfa69bde9201e2c98c20c1d85334be633764057.exe
Resource
win10v2004-20240426-en
General
-
Target
262e636e1017d908369407ee3bfa69bde9201e2c98c20c1d85334be633764057.exe
-
Size
41KB
-
MD5
52a59189299e6e28c7f3737a21875641
-
SHA1
9000b86b601578e46b0ccb65e1f03ded17d39a57
-
SHA256
262e636e1017d908369407ee3bfa69bde9201e2c98c20c1d85334be633764057
-
SHA512
e5c1dba752c73ebf186450ccf4b9e9beb2d0c5b676c53ed62bbf59d2ea5961aa848f77bcbcf69cd253721a818c6f0add8b8186870d4a05f8bf04a19c61c28833
-
SSDEEP
768:Ef7Shusc1TMbYI3aW31MjHCPip1MmMbC0g:gmhe12YI3H1MjHCPizDoC0g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 262e636e1017d908369407ee3bfa69bde9201e2c98c20c1d85334be633764057.exe
Files
-
262e636e1017d908369407ee3bfa69bde9201e2c98c20c1d85334be633764057.exe.exe windows:6 windows x64 arch:x64
4f1463f8c0617e0ceb95bb4c6a849655
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntdll
NtLoadDriver
RtlAdjustPrivilege
NtDeviceIoControlFile
RtlGetFullPathName_UEx
RtlInitUnicodeString
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
RtlCreateRegistryKey
NtUnloadDriver
NtQuerySystemInformation
RtlWriteRegistryValue
NtCreateFile
NtClose
kernel32
GetLastError
GetModuleHandleW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WriteFile
LoadLibraryExW
CreateFileW
GetProcAddress
VirtualFree
GetCurrentProcess
VirtualAlloc
CloseHandle
K32GetModuleInformation
vcruntime140
__current_exception_context
memset
__current_exception
__C_specific_handler
memcpy
api-ms-win-crt-stdio-l1-1-0
__p__commode
__acrt_iob_func
__stdio_common_vfprintf
_set_fmode
api-ms-win-crt-string-l1-1-0
_stricmp
wcscat_s
wcscpy_s
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
_initialize_onexit_table
_crt_atexit
terminate
system
_seh_filter_exe
_set_app_type
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
_exit
exit
__p___argc
__p___argv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
api-ms-win-crt-filesystem-l1-1-0
remove
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 564B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ