ACE-BOOT.pdb
Static task
static1
General
-
Target
a8b5039daaf5be54c8003440f2c145a49a71842b86301a2a9a750529846b2b09
-
Size
575KB
-
MD5
1018044f7bfcd166ad1ff9e469437876
-
SHA1
1148262f7e07405b316bd108d4a6f7106367f490
-
SHA256
a8b5039daaf5be54c8003440f2c145a49a71842b86301a2a9a750529846b2b09
-
SHA512
4f5ac07a4a839b95d7a9583d430db17519739af410457e60fb348ce47307258e7fe4114a750422690b94d16a373414bc3784446d567382720c52a25af12ef453
-
SSDEEP
6144:mawYuAMYbLKRI6i+Oi5v8ksJhchRA45jj:meure5ipDAEj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8b5039daaf5be54c8003440f2c145a49a71842b86301a2a9a750529846b2b09
Files
-
a8b5039daaf5be54c8003440f2c145a49a71842b86301a2a9a750529846b2b09.sys windows:10 windows x64 arch:x64
b7b493a7e5a49a4fd7a6157f5eee1116
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
fltmgr.sys
FltReleaseFileNameInformation
FltGetFileNameInformationUnsafe
ntoskrnl.exe
ExAllocatePoolWithTag
ExFreePoolWithTag
ObReferenceObjectByHandle
ObReferenceObjectByPointer
ObfDereferenceObject
ZwClose
PsGetCurrentThreadId
__C_specific_handler
IoFileObjectType
ZwCreateFile
ZwReadFile
ZwWriteFile
ZwQueryFullAttributesFile
ZwDeleteFile
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
RtlInitUnicodeString
MmGetSystemRoutineAddress
MmIsAddressValid
RtlCopyUnicodeString
ZwCreateKey
ZwOpenKey
ZwQueryValueKey
ZwSetValueKey
IofCompleteRequest
IoRegisterShutdownNotification
RtlRandomEx
ZwFlushBuffersFile
KeInitializeEvent
KeSetEvent
KeWaitForSingleObject
PsCreateSystemThread
PsTerminateSystemThread
PsThreadType
ZwQueryInformationFile
wcscat_s
ExAllocatePool
ZwDeleteKey
ZwEnumerateKey
ZwFlushKey
ZwQueryKey
strcpy_s
RtlUnicodeStringToAnsiString
RtlFreeAnsiString
RtlGetVersion
KeBugCheckEx
KeAcquireGuardedMutex
KeReleaseGuardedMutex
KeClearEvent
KeInitializeGuardedMutex
IoCreateDevice
KeAreAllApcsDisabled
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
KeQueryTimeIncrement
ZwQuerySystemInformation
wcslen
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
ZwDeleteValueKey
ZwOpenFile
ZwCreateSection
wcsrchr
RtlAppendUnicodeStringToString
ZwUnloadDriver
PsGetCurrentProcessId
MmMapViewInSystemSpace
MmUnmapViewInSystemSpace
RtlImageDirectoryEntryToData
strlen
MmProbeAndLockPages
MmUnlockPages
MmMapLockedPagesSpecifyCache
IoAllocateMdl
IoFreeMdl
strncpy_s
_strupr
KeDelayExecutionThread
RtlInt64ToUnicodeString
IoCreateNotificationEvent
hal
KeStallExecutionProcessor
KeQueryPerformanceCounter
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 638KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 716B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tvm0 Size: 384KB - Virtual size: 384KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ