D:\JxCodeProjects\WhiteApplication4.0\x64\Release\jxprocmon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
34fb2cc56693b25ad3129e840be6692aeeed2e59ecb1af2a8ae694d32a2181bc.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
34fb2cc56693b25ad3129e840be6692aeeed2e59ecb1af2a8ae694d32a2181bc.exe
Resource
win10v2004-20240802-en
General
-
Target
34fb2cc56693b25ad3129e840be6692aeeed2e59ecb1af2a8ae694d32a2181bc
-
Size
26KB
-
MD5
54c5c73382e8a9ab940e24617c49a0b8
-
SHA1
6941e159b7c0a84d307abd2af6bb4e2f4736fd74
-
SHA256
34fb2cc56693b25ad3129e840be6692aeeed2e59ecb1af2a8ae694d32a2181bc
-
SHA512
5289a29e8ce23d48d3c90c30db5d31531ba056aa5ea43720ce5774704699f6b6be4d567332d50dc51ff916ee37c0443274a8cfb66378940bcd427e948214713b
-
SSDEEP
384:49L0j9KJzwfTUu69Z9CXuFpyKezzKsonhq9gYM+xgdvo+EbynnUYrwiE:aYj9wPZ9CXuFpazKsonhq9gYTqg+n7M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 34fb2cc56693b25ad3129e840be6692aeeed2e59ecb1af2a8ae694d32a2181bc
Files
-
34fb2cc56693b25ad3129e840be6692aeeed2e59ecb1af2a8ae694d32a2181bc.exe windows:5 windows x64 arch:x64
bd0fbdf09b7580e9a9dedf421be4e9f5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntoskrnl.exe
KeUnstackDetachProcess
KeStackAttachProcess
PsGetProcessInheritedFromUniqueProcessId
MmIsAddressValid
KeWaitForSingleObject
RtlCopyUnicodeString
ObQueryNameString
PsGetCurrentProcessId
wcsstr
KeDelayExecutionThread
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
PsReferencePrimaryToken
CmRegisterCallback
PsSetLoadImageNotifyRoutine
PsSetCreateProcessNotifyRoutine
CmUnRegisterCallback
PsRemoveLoadImageNotifyRoutine
IofCompleteRequest
RtlAssert
IoCreateSymbolicLink
IoCreateDevice
RtlGetVersion
PsGetProcessId
IoGetCurrentProcess
IoThreadToProcess
SeQueryAuthenticationIdToken
LsaFreeReturnBuffer
PsDereferencePrimaryToken
__C_specific_handler
ExAllocatePool
ExFreePoolWithTag
PsLookupProcessByProcessId
ObfDereferenceObject
PsProcessType
ObOpenObjectByPointer
ZwTerminateProcess
ZwClose
KeSetEvent
DbgPrint
MmGetSystemRoutineAddress
KeInitializeEvent
fltmgr.sys
FltRegisterFilter
FltGetVolumeName
FltGetFileNameInformation
FltParseFileNameInformation
FltReleaseFileNameInformation
FltCloseCommunicationPort
FltSendMessage
FltStartFiltering
FltBuildDefaultSecurityDescriptor
FltCreateCommunicationPort
FltFreeSecurityDescriptor
FltUnregisterFilter
FltCloseClientPort
ksecdd.sys
GetSecurityUserInfo
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PAGE Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 772B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 156B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ