ACE-DYNGAME.pdb
Static task
static1
General
-
Target
61bc7cf5b3f6c6c6dbd5b822567def5671d3d7259e416315a8bd329c8a2f5c3e
-
Size
671KB
-
MD5
63a479e941a8cfd74219ccf2c0a4a001
-
SHA1
6dad61d310fc09d2388fb36434cdde428c3fe8fc
-
SHA256
61bc7cf5b3f6c6c6dbd5b822567def5671d3d7259e416315a8bd329c8a2f5c3e
-
SHA512
293110e64edbdcbbb7c77ee81de3536352982dd8ed9cb6cc2fc8c4d67b81e2460232e07a9a29472a039c7ed9aec3ea9794deea2010eb95991746ee54a766055a
-
SSDEEP
6144:TngZV08vuPoWfo1t7cSNGA/09orpv3VjSCKtU3dmDfFFjRLeuLQbZUuh/oML5xJ/:zjmURKl1xJE8tQa3gnSu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61bc7cf5b3f6c6c6dbd5b822567def5671d3d7259e416315a8bd329c8a2f5c3e
Files
-
61bc7cf5b3f6c6c6dbd5b822567def5671d3d7259e416315a8bd329c8a2f5c3e.sys windows:10 windows x64 arch:x64
cd1b57c2422364908551534d9abcfcea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
fltmgr.sys
FltGetFileNameInformationUnsafe
FltReleaseFileNameInformation
ndis.sys
NdisMUnmapIoSpace
NdisCloseConfiguration
NdisOpenConfigurationEx
NdisReadConfiguration
NdisMMapIoSpace
ntoskrnl.exe
ExFreePoolWithTag
IoGetDeviceProperty
MmIsAddressValid
ZwClose
MmGetPhysicalAddress
PsGetCurrentProcessId
DbgPrint
KeInitializeEvent
KeSetEvent
KeSetSystemGroupAffinityThread
KeRevertToUserGroupAffinityThread
KeWaitForSingleObject
KeGetCurrentProcessorNumberEx
PsCreateSystemThread
PsTerminateSystemThread
ObReferenceObjectByHandle
ObfDereferenceObject
ZwOpenFile
KeDeregisterBugCheckReasonCallback
KeRegisterBugCheckReasonCallback
ExAllocatePoolWithTag
MmProbeAndLockPages
MmUnlockPages
MmMapLockedPagesSpecifyCache
MmUnmapLockedPages
IoAllocateMdl
IoFreeMdl
ZwUnloadDriver
ZwOpenSection
ZwMapViewOfSection
ZwUnmapViewOfSection
PsGetCurrentThreadId
__C_specific_handler
IofCompleteRequest
IoCreateDevice
IoDeleteDevice
IoRegisterShutdownNotification
IoUnregisterShutdownNotification
RtlUnicodeStringToInteger
KeStackAttachProcess
KeUnstackDetachProcess
PsGetProcessPeb
IoGetCurrentProcess
PsLookupProcessByProcessId
KeDelayExecutionThread
KeQueryTimeIncrement
MmGetSystemRoutineAddress
PsInitialSystemProcess
MmMapIoSpace
MmUnmapIoSpace
RtlInt64ToUnicodeString
RtlInitAnsiString
RtlAnsiStringToUnicodeString
RtlAppendUnicodeToString
IoCreateFile
ZwCreateFile
ZwQueryInformationFile
ZwSetInformationFile
ZwReadFile
IoCreateFileSpecifyDeviceObjectHint
IoGetBaseFileSystemDeviceObject
IoFileObjectType
KeRevertToUserAffinityThread
KeSetSystemAffinityThread
KeSetPriorityThread
RtlInsertElementGenericTableFullAvl
MmGetVirtualForPhysical
IoDriverObjectType
ZwOpenKey
ZwDeleteKey
ZwQueryValueKey
ExAllocatePool
ZwEnumerateKey
KeQueryActiveProcessorCountEx
PsThreadType
ZwOpenSymbolicLinkObject
ZwQuerySymbolicLinkObject
ZwQueryObject
RtlAnsiCharToUnicodeChar
KeBugCheckEx
RtlUnicodeStringToAnsiString
RtlInitUnicodeString
MmBuildMdlForNonPagedPool
hal
HalGetBusDataByOffset
KeStallExecutionProcessor
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 76B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.tvm0 Size: 568KB - Virtual size: 568KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ