BthHFEnum.pdb
Static task
static1
Behavioral task
behavioral1
Sample
BthHfEnum.sys
Resource
win10v2004-20240508-en
General
-
Target
BthHfEnum.sys
-
Size
180KB
-
MD5
1508aaac46ca61a85d629d7746e87f53
-
SHA1
12641fe9f6a4953c5c4394dc4dc7f4ad3a5f08f6
-
SHA256
04efa2222fccfa899813c4d0ce2ca397eec1d1ec446778aef0e575a262f44a05
-
SHA512
fc024061788ee92402a741e9799f7c434d082cb3112edb9d43539bee59c29e020a1d1875f27b5b8628b5c3ebd45b9a89b4d2636377fd61657c59558fc84cb24b
-
SSDEEP
3072:7CTRbVOQgodmLUBpNbZYjdkx3EXEnyTXxylsMzp8H8Xd:7CFRGuBBnfNV8H8X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource BthHfEnum.sys
Files
-
BthHfEnum.sys.sys windows:10 windows x64 arch:x64
b72baafb37be1c170a074f3e470573c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntoskrnl.exe
ObReferenceObjectByHandle
KeSetEvent
RtlAnsiCharToUnicodeChar
__C_specific_handler
ExAllocatePool2
IoGetDevicePropertyData
KeAcquireSpinLockRaiseToDpc
IoWMIRegistrationControl
ExFreePoolWithTag
EtwRegister
MmGetSystemRoutineAddress
EtwUnregister
KeReleaseSpinLock
EtwWriteTransfer
IoSetDevicePropertyData
IoSetDeviceInterfacePropertyData
RtlCompareMemory
KeResetEvent
KeWaitForSingleObject
KeClearEvent
ExEventObjectType
ObfReferenceObject
KeInitializeEvent
DbgPrintEx
RtlCopyUnicodeString
ZwPowerInformation
RtlRunOnceExecuteOnce
IoGetDeviceInterfaces
IoGetDeviceObjectPointer
ExFreePool
IoBuildDeviceIoControlRequest
IofCallDriver
strnlen
KseQueryDeviceFlags
IoQueryFullDriverPath
RtlFreeAnsiString
KeGetCurrentIrql
DbgkWerCaptureLiveKernelDump
RtlUnicodeStringToAnsiString
RtlInitAnsiString
KeQueryTimeIncrement
KeInitializeSpinLock
RtlInitUnicodeString
ObfDereferenceObject
EtwSetInformation
RtlCompareUnicodeString
hal
KeQueryPerformanceCounter
btampm.sys
BtaMpmUnregister
BtaMpmRegister
BtaMpmUpdateConnectionStatus
BtaMpmBuildIndirectStringFromMessageWithSingleUTF8Arg
BtaMpmSuspendRequest
BtaMpmGetRemoteDeviceProfileVersionAndAttribute
BtaMpmConnectionRequest
wpprecorder.sys
WppAutoLogTrace
imp_WppRecorderReplay
WppAutoLogStop
WppAutoLogStart
ksecdd.sys
BCryptCreateHash
BCryptHashData
BCryptCloseAlgorithmProvider
BCryptFinishHash
BCryptOpenAlgorithmProvider
BCryptGetProperty
BCryptDestroyHash
wdfldr.sys
WdfVersionBind
WdfLdrQueryInterface
WdfVersionUnbind
WdfVersionUnbindClass
WdfVersionBindClass
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
NONPAGE Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
fothk Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 4KB - Virtual size: 651B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
GFIDS Size: 4KB - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ