C:\Users\Desi\Desktop\Stuff\Development\FN PROJECTS\ioctl base updated by redshirtfan\build\driver\driver.pdb
Static task
static1
General
-
Target
driver.sys
-
Size
9KB
-
MD5
8627fb2450a8dfe4aec93c84fcd1747b
-
SHA1
887ea4fbd7f8ca04054271bd72b26d8174b978f5
-
SHA256
18fa21bc32952cf9b359e9dbc25c8bb79bde342313e3c1a06cca21f1b34ace3a
-
SHA512
d6c31414095a78f85e16014de096924213671e53e5a46b050ab623dbcd39e3caff52a05eddf3b39733a8303335aa20aaa6a8ff6d4b984ed00fbf0c9b6975467e
-
SSDEEP
96:y0YE/iiXv7e2vNbXdsSBsq15yQzW8qON4IKSHWj7Dv5LHrD14DDGA:OO+2pdbBh15PWvOeFYcZLHvqn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource driver.sys
Files
-
driver.sys.sys windows:10 windows x64 arch:x64
a673f839deae5b29b0e8a0fe26dfcd36
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
DbgPrintEx
ExAllocatePool
ExFreePoolWithTag
MmUnmapIoSpace
MmMapIoSpaceEx
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ObfDereferenceObject
MmGetPhysicalMemoryRanges
MmCopyMemory
MmGetVirtualForPhysical
MmIsAddressValid
PsLookupProcessByProcessId
IoCreateDriver
PsGetProcessSectionBaseAddress
ZwQuerySystemInformation
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 664B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ