C:\Users\Devtop1\source\repos\KDU\Source\Hamakaze\output\x64\Release\kdu.pdb
Static task
static1
Behavioral task
behavioral1
Sample
aura win 11/Driver/DrvLdr.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
aura win 11/Driver/Taigei64.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
aura win 11/Driver/VixenFree.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
aura win 11/Driver/driver.sys
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
aura win 11/Driver/drv64.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
aura win 11/Startup.bat
Resource
win11-20240802-en
General
-
Target
aura win 11.rar
-
Size
1.7MB
-
MD5
0b510674e1ceac44d3101801ee713126
-
SHA1
4070bbda423125f6ab8a64d53565ced99b62887a
-
SHA256
a30dea1e5db69d0ad36c540138fdcd78ecec75f10db7285b6d2eb0c8156ff855
-
SHA512
ba600879f4b4cf7854d5eb193f6b0c28f61b3d18dd9fc694d47e72701bd23a0b9e9ba36ec455d3fc2718ccedde105e632a6577f4b3d2c8eb33a356eb606a9eb2
-
SSDEEP
24576:Qp8XH6VrAMKOpqUHvqOjPCth/wV74SGEpJPSEFXIrHooZ92CS:FaVrAOdHHath/wV74SGEpJPRqrHl9C
Malware Config
Signatures
-
Unsigned PE 5 IoCs
Checks for missing Authenticode signature.
resource unpack001/aura win 11/Driver/DrvLdr.exe unpack001/aura win 11/Driver/Taigei64.dll unpack001/aura win 11/Driver/VixenFree.exe unpack001/aura win 11/Driver/driver.sys unpack001/aura win 11/Driver/drv64.dll
Files
-
aura win 11.rar.rar
-
aura win 11/Driver/DrvLdr.exe.exe windows:6 windows x64 arch:x64
d7343acd8a08117f394fbb4463115abc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetProcAddress
FreeLibrary
LoadLibraryExW
HeapCreate
HeapAlloc
HeapDestroy
GetStartupInfoW
WriteProcessMemory
ResumeThread
UnmapViewOfFile
DeleteFileW
CreateProcessW
GetModuleHandleW
GetCurrentProcessId
ReadFile
WriteFile
SetFilePointer
TerminateProcess
Sleep
VirtualUnlock
VirtualLock
TerminateThread
CreateThread
HeapSetInformation
GetSystemDirectoryW
CreateFileW
VirtualFree
CreateEventW
GetProcessHeap
GetConsoleScreenBufferInfo
SetConsoleTextAttribute
GetCommandLineW
GetStdHandle
GetModuleFileNameW
FormatMessageW
GetSystemInfo
VirtualAllocEx
ReadProcessMemory
GetSystemTimeAsFileTime
VirtualFreeEx
CreateFileMappingW
MapViewOfFile
GetFirmwareEnvironmentVariableW
GetConsoleMode
ExpandEnvironmentStringsW
LoadLibraryW
GetCurrentDirectoryW
WriteConsoleW
RtlCompareMemory
CloseHandle
WaitForSingleObject
GetLastError
GetCurrentProcess
VirtualAlloc
SetDllDirectoryW
SetLastError
HeapReAlloc
HeapSize
GetFileSizeEx
SetFilePointerEx
GetStringTypeW
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetConsoleOutputCP
FlushFileBuffers
GetFileType
LCMapStringW
CompareStringW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
HeapFree
GetCommandLineA
GetModuleHandleExW
ExitProcess
RtlPcToFileHeader
RaiseException
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
InitializeSListHead
GetCurrentThreadId
QueryPerformanceCounter
advapi32
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
ntdll
NtSetInformationProcess
LdrLockLoaderLock
RtlTimeToSecondsSince1970
NtLoadDriver
NtTerminateProcess
LdrUnlockLoaderLock
NtSetValueKey
NtOpenSection
NtQueryObject
LdrFindEntryForAddress
NtOpenFile
NtWaitForSingleObject
NtFsControlFile
RtlLengthRequiredSid
NtUnloadDriver
RtlEqualUnicodeString
LdrGetProcedureAddress
RtlNtdllName
NtDuplicateObject
NtSetSecurityObject
RtlDoesFileExists_U
NtCreateMutant
RtlGetVersion
LdrUnloadDll
NtAlpcDisconnectPort
RtlCreateSecurityDescriptor
NtAlpcCreatePort
RtlCreateAcl
NtAlpcAcceptConnectPort
RtlLengthSid
NtReplyWaitReceivePort
RtlSetDaclSecurityDescriptor
RtlSubAuthoritySid
RtlInitializeSid
NtDeviceIoControlFile
NtOpenKey
NtMapViewOfSection
NtUnmapViewOfSection
LdrLoadDll
NtCreateSection
LdrAccessResource
RtlSetLastWin32Error
NtCreateFile
RtlNtStatusToDosError
RtlEqualSid
RtlInitString
RtlFreeHeap
NtQueryDirectoryObject
RtlFreeSid
RtlExpandEnvironmentStrings
NtOpenDirectoryObject
NtFlushBuffersFile
RtlUnicodeStringToAnsiString
NtClose
NtQueryInformationToken
RtlAllocateAndInitializeSid
LdrFindResource_U
RtlDosPathNameToNtPathName_U
RtlInitUnicodeString
NtOpenProcess
RtlFreeUnicodeString
NtQueryInformationProcess
NtWriteFile
NtQuerySystemInformation
RtlAllocateHeap
NtOpenThread
NtFreeVirtualMemory
NtOpenProcessToken
RtlAnsiStringToUnicodeString
RtlFreeAnsiString
NtAdjustPrivilegesToken
RtlImageNtHeader
RtlAddAccessAllowedAce
rpcrt4
UuidCreate
setupapi
SetupDiDestroyDeviceInfoList
SetupDiCreateDeviceInfoW
SetupDiSetDeviceRegistryPropertyW
SetupDiCallClassInstaller
SetupDiGetINFClassW
SetupDiCreateDeviceInfoList
SetupDiRemoveDevice
newdev
UpdateDriverForPlugAndPlayDevicesW
bcrypt
BCryptEncrypt
BCryptDestroyKey
BCryptOpenAlgorithmProvider
BCryptGenerateSymmetricKey
BCryptCloseAlgorithmProvider
msdelta
DeltaFree
ApplyDeltaB
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 87KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
aura win 11/Driver/Taigei64.dll.dll windows:6 windows x64 arch:x64
5fdb5e4b32ad7ee52dcb35ca36fae4bb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
kernel32
DisableThreadLibraryCalls
Sleep
GetCommandLineW
LocalFree
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RaiseException
EncodePointer
InterlockedFlushSList
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
FreeLibrary
GetModuleHandleExW
GetProcAddress
GetModuleFileNameW
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
LCMapStringW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
FlushFileBuffers
WriteFile
shell32
CommandLineToArgvW
ntdll
RtlLookupFunctionEntry
RtlCaptureContext
NtConnectPort
NtRequestWaitReplyPort
RtlVirtualUnwind
NtCreateFile
NtDeviceIoControlFile
NtDelayExecution
RtlInitUnicodeString
NtQueryInformationProcess
RtlPcToFileHeader
RtlUnwindEx
NtClose
Exports
Exports
RegisterForProvider
RegisterForProvider2
SB_SMS_GetCtrlCountEx
SB_SMS_QuickCommandEx
SB_SMS_ReadBlockEx
SB_SMS_ReadByteEx
SB_SMS_ReadWordEx
SB_SMS_WriteBlockEx
SB_SMS_WriteByteEx
SB_SMS_WriteWordEx
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
aura win 11/Driver/VixenFree.exe.exe windows:6 windows x64 arch:x64
42450064047a188c95bcf43c0652ead5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\conspiracy\source\repos\chinkburner69\build\VixenFree.pdb
Imports
kernel32
GetProcAddress
FreeLibrary
QueryPerformanceCounter
SetConsoleTitleA
DeviceIoControl
CreateFileW
CreateToolhelp32Snapshot
Sleep
Process32NextW
Process32FirstW
CloseHandle
CreateThread
GetModuleHandleW
GetConsoleWindow
lstrcmpiW
LoadLibraryA
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
IsDebuggerPresent
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetLocaleInfoA
GlobalUnlock
WideCharToMultiByte
GlobalLock
GlobalFree
GlobalAlloc
QueryPerformanceFrequency
MultiByteToWideChar
user32
GetKeyboardLayout
GetForegroundWindow
GetWindowLongW
DefWindowProcW
GetWindow
LoadCursorW
SetCapture
SetClipboardData
GetClipboardData
EmptyClipboard
GetWindowRect
GetMenu
DestroyWindow
SetWindowPos
SetWindowLongPtrW
CreateWindowExW
GetSystemMetrics
UnregisterClassW
GetWindowLongPtrW
ShowWindow
TrackMouseEvent
DispatchMessageW
PeekMessageW
RegisterClassW
SetWindowDisplayAffinity
MoveWindow
SetMenu
SetLayeredWindowAttributes
TranslateMessage
mouse_event
SetWindowLongW
PostQuitMessage
FindWindowA
UpdateWindow
SendInput
GetKeyState
GetMessageExtraInfo
ScreenToClient
GetCapture
ClientToScreen
GetAsyncKeyState
SetCursor
GetClientRect
IsWindowUnicode
ReleaseCapture
SetCursorPos
GetCursorPos
OpenClipboard
CloseClipboard
gdi32
GetStockObject
shell32
ShellExecuteA
d3d9
Direct3DCreate9Ex
imm32
ImmSetCompositionWindow
ImmReleaseContext
ImmGetContext
ImmSetCandidateWindow
dwmapi
DwmExtendFrameIntoClientArea
msvcp140
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
_Thrd_detach
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@M@Z
?_Xlength_error@std@@YAXPEBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?uncaught_exceptions@std@@YAHXZ
?_Throw_Cpp_error@std@@YAXH@Z
?good@ios_base@std@@QEBA_NXZ
_Cnd_do_broadcast_at_thread_exit
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memmove
memcpy
memset
__C_specific_handler
__current_exception_context
__current_exception
__std_exception_copy
__std_exception_destroy
strstr
__std_terminate
_CxxThrowException
memchr
memcmp
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
fread
__stdio_common_vfprintf
fseek
fwrite
fflush
__acrt_iob_func
ftell
__stdio_common_vsscanf
__stdio_common_vsprintf_s
fclose
__p__commode
__stdio_common_vsnprintf_s
_set_fmode
_wfopen
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-string-l1-1-0
tolower
strcmp
strncpy
strncmp
api-ms-win-crt-heap-l1-1-0
malloc
free
_set_new_mode
_callnewh
api-ms-win-crt-convert-l1-1-0
atof
api-ms-win-crt-runtime-l1-1-0
_initterm_e
_exit
system
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_initterm
_beginthreadex
terminate
_seh_filter_exe
_cexit
_crt_atexit
exit
_invalid_parameter_noinfo_noreturn
_set_app_type
_register_onexit_function
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_get_initial_narrow_environment
api-ms-win-crt-math-l1-1-0
atan2
atan2f
ceilf
asin
fmodf
atan
cosf
powf
sqrtf
sinf
tanf
__setusermatherr
acosf
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 364KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
aura win 11/Driver/driver.sys.sys windows:10 windows x64 arch:x64
e7e980a616f80f51ead95462ea818d68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
D:\Psychoware 1.4\build\driver\driver.pdb
Imports
ntoskrnl.exe
RtlInitUnicodeString
MmGetSystemRoutineAddress
ExAllocatePool
ExFreePoolWithTag
MmUnmapIoSpace
MmMapIoSpaceEx
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ObfDereferenceObject
MmGetPhysicalMemoryRanges
MmCopyMemory
MmGetVirtualForPhysical
MmIsAddressValid
PsLookupProcessByProcessId
PsGetProcessSectionBaseAddress
IoCreateDriver
ZwQuerySystemInformation
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 678B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
aura win 11/Driver/drv64.dll.dll windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Exports
Exports
gProvTable
Sections
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
aura win 11/Startup.bat
-
aura win 11/info.txt