C:\Perforce\PARSHIN-TDSSKiller-3.1\out_x64\WNet Release\klmd_wnet_x64_release.pdb
Static task
static1
Behavioral task
behavioral1
Sample
50796733.sys
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
50796733.sys
Resource
win10v2004-20240802-en
General
-
Target
50796733.sys
-
Size
274KB
-
MD5
4c58affcd0c9b0c7528c05d71ea08c63
-
SHA1
9cc206522deac53387ce37db06c4d10e839e0a91
-
SHA256
3efdfb47b0556e97256447f7d619a293d713327496a9524bfbe6a3294e9a7df4
-
SHA512
3b480dee4226279783a0054bfb2944efd1275f2706ec5e1adad7e8dbdc2421423a9c8234b5a572f4ae980a21782e44b80bbd9c0ca030b3bb3feccba380161871
-
SSDEEP
3072:GxDWWpyd6fK9FRV5eMarQKtGbzrfGi4KDzR9T97MFqYwHk8mTSd4s8DuyHEdreeR:GxDWmyd8KXRPZ97Gibgqt4lEVeeaR2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 50796733.sys
Files
-
50796733.sys.sys windows:6 windows x64 arch:x64
e304f9496b3133f877570695fde86783
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntoskrnl.exe
ObfDereferenceObject
PsSetCreateThreadNotifyRoutine
PsRemoveCreateThreadNotifyRoutine
PsGetCurrentProcessId
PsGetCurrentThreadId
PsGetThreadProcessId
RtlRandomEx
PsLookupThreadByThreadId
KeEnterCriticalRegion
KeLeaveCriticalRegion
ExAcquireResourceExclusiveLite
ExReleaseResourceLite
ZwClose
ZwCreateKey
ZwOpenKey
ZwDeleteValueKey
ZwSetValueKey
RtlCompareMemory
ExInitializeResourceLite
ExAcquireResourceSharedLite
ExDeleteResourceLite
ZwEnumerateValueKey
RtlInitUnicodeString
RtlCopyUnicodeString
RtlAppendUnicodeToString
IoCreateFile
ZwQueryInformationFile
ZwSetInformationFile
ZwReadFile
ZwWriteFile
ZwCreateSection
ZwMapViewOfSection
ZwUnmapViewOfSection
ZwDeleteKey
ZwEnumerateKey
ZwQueryValueKey
RtlPrefixUnicodeString
KeStackAttachProcess
KeUnstackDetachProcess
__chkstk
PsInitialSystemProcess
RtlCompareUnicodeString
KeInitializeEvent
KeWaitForSingleObject
IoBuildSynchronousFsdRequest
ExFreePoolWithTag
MmIsAddressValid
__C_specific_handler
IoAllocateWorkItem
IoFreeWorkItem
IoQueueWorkItem
RtlCreateSecurityDescriptor
RtlSetDaclSecurityDescriptor
ProbeForRead
ProbeForWrite
MmGetSystemRoutineAddress
IofCompleteRequest
IoGetDeviceObjectPointer
IoEnumerateDeviceObjectList
IoGetLowerDeviceObject
ZwSetSystemInformation
IoDriverObjectType
DbgPrint
ExQueueWorkItem
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
IoRegisterLastChanceShutdownNotification
IoUnregisterShutdownNotification
IoRegisterBootDriverReinitialization
IoRegisterDriverReinitialization
RtlEqualUnicodeString
KeSetEvent
ExSystemTimeToLocalTime
ExInitializeRundownProtection
ExAcquireRundownProtection
ExReleaseRundownProtection
ExRundownCompleted
ExWaitForRundownProtectionRelease
IoGetCurrentProcess
RtlInitializeGenericTableAvl
RtlInsertElementGenericTableAvl
RtlDeleteElementGenericTableAvl
RtlLookupElementGenericTableAvl
RtlEnumerateGenericTableWithoutSplayingAvl
SeTokenType
SeCreateClientSecurity
SeImpersonateClientEx
PsDereferencePrimaryToken
PsDereferenceImpersonationToken
PsRevertToSelf
KeBugCheckEx
IofCallDriver
ExAllocatePoolWithTag
RtlUnicodeToMultiByteN
RtlAnsiCharToUnicodeChar
RtlTimeToTimeFields
KeDelayExecutionThread
KeAcquireInStackQueuedSpinLock
KeReleaseInStackQueuedSpinLock
ExQueryDepthSList
ExpInterlockedPopEntrySList
ExpInterlockedPushEntrySList
ExInitializeNPagedLookasideList
ExDeleteNPagedLookasideList
ZwCreateFile
wcsrchr
RtlAnsiStringToUnicodeString
RtlUnicodeStringToAnsiString
RtlAppendUnicodeStringToString
RtlxUnicodeStringToAnsiSize
RtlxAnsiStringToUnicodeSize
FsRtlIsNameInExpression
NlsMbOemCodePageTag
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
NtFsControlFile
NtQueryInformationFile
ObOpenObjectByPointer
ZwSetSecurityObject
IoFileObjectType
KeClearEvent
KeAcquireSpinLockAtDpcLevel
KeReleaseSpinLockFromDpcLevel
MmProbeAndLockPages
MmIsDriverVerifying
PsCreateSystemThread
PsTerminateSystemThread
IoAllocateIrp
IoAllocateMdl
IoFreeIrp
IoFreeMdl
IoGetDeviceInterfaces
IoRegisterPlugPlayNotification
IoUnregisterPlugPlayNotification
ObfReferenceObject
RtlRandom
RtlInitAnsiString
RtlFreeUnicodeString
RtlCompareString
ZwQuerySystemInformation
MmSystemRangeStart
strchr
_stricmp
ZwOpenFile
ObQueryNameString
IoBuildDeviceIoControlRequest
RtlUpcaseUnicodeString
RtlInitializeGenericTable
RtlInsertElementGenericTable
RtlDeleteElementGenericTable
RtlLookupElementGenericTable
RtlIsGenericTableEmpty
MmUnlockPages
MmMapIoSpace
MmUnmapIoSpace
MmGetPhysicalMemoryRanges
PsLookupProcessByProcessId
RtlVolumeDeviceToDosName
IoQueryFileDosDeviceName
PsSetCreateProcessNotifyRoutine
PsSetLoadImageNotifyRoutine
ZwNotifyChangeKey
atoi
NtBuildNumber
PsGetVersion
RtlGetVersion
RtlUnicodeStringToInteger
ZwOpenDirectoryObject
isdigit
KeAcquireSpinLockRaiseToDpc
KeReleaseSpinLock
CmUnRegisterCallback
IoAttachDeviceToDeviceStack
IoDetachDevice
IoDeviceObjectType
KeInitializeDpc
KeInsertQueueDpc
KeSetImportanceDpc
KeSetTargetProcessorDpc
KeNumberProcessors
ZwQueryInformationProcess
PsGetProcessImageFileName
PsGetProcessInheritedFromUniqueProcessId
ExReInitializeRundownProtection
hal
KeQueryPerformanceCounter
Sections
.text Size: 177KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ