d:\young\httprdr\tdxflt\objfre_wxp_x86\i386\TdxFlt_i386.pdb
Static task
static1
General
-
Target
8baa4db38eb5eaad09cc9675fbe75220N
-
Size
108KB
-
MD5
8baa4db38eb5eaad09cc9675fbe75220
-
SHA1
f8cd542cb86c1f2cfadb28facc154db24ad3c387
-
SHA256
1c85ff3afc0a000f1fd7e378d9ade2bc40f985dfbcb4e47d316f735bdca56cc9
-
SHA512
8af73b8a862a4ad86381837bc2a9192ee8299948364f8bd1b9ee2293ad0bc082f3a09f48eb0a525e7b31b08cfd05421ee0b0ddcf3a18709b02d8c9351fb026d6
-
SSDEEP
3072:vzv/FDCN4xpWTXOHAtewCQDwbkkH7zYgBLL9d8SI:bv/FZ+XOfwCQDwbkkH78gBLL9d8S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8baa4db38eb5eaad09cc9675fbe75220N
Files
-
8baa4db38eb5eaad09cc9675fbe75220N.sys windows:6 windows x86 arch:x86
9bc8672fe3c6ba8a1d205085b7d2e53d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ObReferenceObjectByHandle
ZwCreateFile
IofCallDriver
IoBuildDeviceIoControlRequest
IoxBV�
\
\
-
2
6
1
5
t
e
o
\
o
r
i
e
t
Z
a
KeInitializeEvent
ObfDereferenceObject
KeWaitForSingleObject
ZwClose
RtlInitUnicodeString
KeSetEvent
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ