C:\Users\Riley\Desktop\Backup\priv ioctl old\priv ioctl old\x64\Release\ioctl.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ioctl.sys
Resource
win10v2004-20240802-en
General
-
Target
ioctl.sys
-
Size
11KB
-
MD5
45f120fbb1ac1be99a85d698464b2449
-
SHA1
2cb00ebc87835b41438c2d9b42e7f6411a4dfda1
-
SHA256
85c46f88fa17cb801f33a43178dacadd15e18d99e893344417d63808a237b906
-
SHA512
5116e4e4242ad885344addb2de25988dea4d4948030399968ae3d4541af753b0559a1ca6802f00127ce0cde1548e8caae5e32fa9793e67c85ff4d2c466a81d9e
-
SSDEEP
192:Pb2dk42i0Mo7KWqTM0hFibFOatYSS4SdXqmXWkYcvUCgA:Pb2si01T2dFibFOxGyqMWk5vUCt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ioctl.sys
Files
-
ioctl.sys.sys windows:10 windows x64 arch:x64
36c1afe9ec6a67da8c0b357030b1377c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
MmUnmapIoSpace
MmMapIoSpaceEx
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ObfDereferenceObject
MmGetPhysicalMemoryRanges
MmCopyMemory
MmGetVirtualForPhysical
PsLookupProcessByProcessId
IoCreateDriver
PsGetProcessSectionBaseAddress
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 524B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ