Windows
Analysis Report
MpKslDrv.sys
Overview
General Information
Sample name: | MpKslDrv.sys |
Analysis ID: | 1539453 |
MD5: | 5af325bda4568a1a07fee2195a80a188 |
SHA1: | b235430bf74063ce512a3f2c95013f624dcabece |
SHA256: | 3de271e51e33baf258096d572f1ffebf8714af26dbe18b3b4fa98c369c8ed6e1 |
Infos: | |
Errors
|
Detection
Score: | 2 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Source: | Author: Max Altgelt (Nextron Systems): |
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Driver loaded: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 LSASS Driver | 1 LSASS Driver | Direct Volume Access | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1539453 |
Start date and time: | 2024-10-22 17:50:03 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 1m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 1 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | MpKslDrv.sys |
Detection: | UNKNOWN |
Classification: | unknown2.winSYS@0/0@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Corrupt sample or wrongly sele
cted analyzer. Details: object name not found
- Exclude process from analysis
(whitelisted): dllhost.exe, Sg rmBroker.exe, svchost.exe - VT rate limit hit for: MpKslD
rv.sys
File type: | |
Entropy (8bit): | 6.355528043732646 |
TrID: |
|
File name: | MpKslDrv.sys |
File size: | 267'552 bytes |
MD5: | 5af325bda4568a1a07fee2195a80a188 |
SHA1: | b235430bf74063ce512a3f2c95013f624dcabece |
SHA256: | 3de271e51e33baf258096d572f1ffebf8714af26dbe18b3b4fa98c369c8ed6e1 |
SHA512: | 0b310e9006954312fad190936bbb9de8087bfe3d4b1c7d14e74f162ab74d5ddabe8680e5c957cab4d958b4e6e6c1f70853859a6b7c182284d6e5c176faad4e88 |
SSDEEP: | 6144:rVI2G1F5fcbxfVhpQoflvsuaCmGckx+3cI6N9nQWUjtLOfp:rVfG1F51SvbIkxdlnQWUjg |
TLSH: | B7444C5AA2E42CB4E473D27A8E824116DBB27C452B72A6CF217085159F13BF9F63433D |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B.qp.|.#.|.#.|.#.|.#U|.#U..".|.#.|.#.|.#U..".|.#U..".|.#...".|.#..."Q|.#...#.|.#...".|.#Rich.|.#........................PE..d.. |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x1c000a9f0 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x1c0000000 |
Subsystem: | native |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, FORCE_INTEGRITY, NX_COMPAT, GUARD_CF |
Time Stamp: | 0x3B7868C2 [Mon Aug 13 23:54:42 2001 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 10 |
OS Version Minor: | 0 |
File Version Major: | 10 |
File Version Minor: | 0 |
Subsystem Version Major: | 10 |
Subsystem Version Minor: | 0 |
Import Hash: | 47c2c1fecaaa006a163303dc25367b58 |
Signature Valid: | true |
Signature Issuer: | CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 9B7554FFA2D97FE692CB10D7B2E315A7 |
Thumbprint SHA-1: | D8FB0CC66A08061B42D46D03546F0D42CBC49B7C |
Thumbprint SHA-256: | 2D7FFCE2C256016291B67285456AA8DA779D711BBF8E6B85C212A157DDFBE77E |
Serial: | 3300000460CF42A912315F6FB3000000000460 |
Instruction |
---|
dec eax |
mov dword ptr [esp+08h], ebx |
push edi |
dec eax |
sub esp, 20h |
dec eax |
mov ebx, edx |
dec eax |
mov edi, ecx |
call 00007F54814D0EF0h |
dec eax |
mov edx, ebx |
dec eax |
mov ecx, edi |
call 00007F548149B901h |
dec eax |
mov ebx, dword ptr [esp+30h] |
dec eax |
add esp, 20h |
pop edi |
ret |
int3 |
dec eax |
mov eax, esp |
dec eax |
mov dword ptr [eax+08h], ebx |
dec eax |
mov dword ptr [eax+10h], ebp |
dec eax |
mov dword ptr [eax+18h], esi |
dec eax |
mov dword ptr [eax+20h], edi |
inc ecx |
push esi |
dec eax |
sub esp, 50h |
xor ebp, ebp |
dec eax |
mov esi, edx |
dec eax |
mov edi, ecx |
dec eax |
test ecx, ecx |
jne 00007F548149B8FCh |
call 00007F54814D0EDEh |
jmp 00007F548149BA00h |
dec eax |
lea eax, dword ptr [0002F7EDh] |
mov dword ptr [0002F713h], 02080000h |
dec esp |
lea esi, dword ptr [0002F70Ch] |
dec eax |
mov dword ptr [0002F70Dh], eax |
dec ecx |
mov ecx, esi |
dec eax |
call dword ptr [00033753h] |
nop dword ptr [eax+eax+00h] |
dec esp |
lea ecx, dword ptr [0002F7B7h] |
dec ecx |
mov edx, esi |
dec esp |
lea eax, dword ptr [0002F585h] |
dec eax |
mov ecx, edi |
dec eax |
call dword ptr [0003356Bh] |
nop dword ptr [eax+eax+00h] |
test eax, eax |
js 00007F548149B9ABh |
call 00007F548149BA1Eh |
mov ebx, eax |
test eax, eax |
js 00007F548149B995h |
call 00007F548149BB93h |
mov ebx, eax |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x3e2b8 | 0x50 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x42000 | 0x3e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x3c000 | 0x1f20 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x3f000 | 0x2520 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x43000 | 0x3b8 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x37f90 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x31e30 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x3e000 | 0x288 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2de44 | 0x2e000 | e9bf49a099c1175cbe60f872da8c4319 | False | 0.4811958644701087 | data | 6.286647718676233 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
awesome | 0x2f000 | 0x9 | 0x400 | c363904fe9d58db8248ba67ac8c51579 | False | 0.0244140625 | data | 0.09660842553356772 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
fothk | 0x30000 | 0x1000 | 0x1000 | 73f047e06c58a0b23ead648bad5687f8 | False | 0.008544921875 | ISO-8859 text, with very long lines (4096), with no line terminators | 0.015431902015625621 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x31000 | 0x899c | 0x8c00 | b2eaaa01da0f9fec460bda8ddf106b20 | False | 0.3313616071428571 | data | 5.213858006560692 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ |
.data | 0x3a000 | 0x1090 | 0x400 | 38c8248f04ecb16e9fff1050dd493fdd | False | 0.0712890625 | data | 0.4360050457734771 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x3c000 | 0x1f20 | 0x2000 | 8c72051d6ab291f7367c74d1c3dae828 | False | 0.4813232421875 | data | 5.2443282459052 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ |
.idata | 0x3e000 | 0xc66 | 0x1000 | 2bfa27e7dd8206d326c7b085b3a2ebf4 | False | 0.303955078125 | data | 4.0523990684818605 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ |
PAGE | 0x3f000 | 0x554 | 0x800 | 1c01050371be6e7eca52c6419cc62286 | False | 0.48779296875 | zlib compressed data | 4.707595225290509 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
INIT | 0x40000 | 0xa35 | 0xc00 | 002f0afe6d60e33519e23d53a448e625 | False | 0.5218098958333334 | data | 5.529926022013773 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
GFIDS | 0x41000 | 0x49c | 0x800 | a722d224b81325e3e66906ff21fde1a3 | False | 0.33251953125 | data | 3.0768628896620207 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.rsrc | 0x42000 | 0x3e0 | 0x400 | 897df342734287bf708c13be072ca39a | False | 0.443359375 | data | 3.346534142921545 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.reloc | 0x43000 | 0x1584 | 0x1800 | df3a9b87c1d7e28f90531c5ec422d204 | False | 0.7501627604166666 | data | 6.201021371040608 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x42060 | 0x37c | data | English | United States | 0.4674887892376682 |
DLL | Import |
---|---|
ntoskrnl.exe | ZwClose, ZwOpenProcess, KeInsertQueueDpc, ZwQuerySystemInformation, ZwOpenSection, ZwUnmapViewOfSection, KeGetCurrentIrql, KeInitializeDpc, KeStackAttachProcess, KeInitializeSemaphore, ZwMapViewOfSection, KeLowerIrql, KeReleaseSemaphore, KeSetTargetProcessorDpc, KeQueryActiveProcessors, KfRaiseIrql, KeWaitForSingleObject, KeUnstackDetachProcess, ZwFsControlFile, ObReferenceObjectByHandle, ZwReadFile, RtlAppendUnicodeToString, IoFreeIrp, IoGetRelatedDeviceObject, MmBuildMdlForNonPagedPool, IoAllocateMdl, RtlQueryRegistryValues, IoBuildAsynchronousFsdRequest, RtlPrefixUnicodeString, ZwDeleteFile, KeSetEvent, IoFreeMdl, IoCreateFileSpecifyDeviceObjectHint, IofCallDriver, KeInitializeEvent, ZwQueryInformationFile, __C_specific_handler, MmMapIoSpace, MmUnmapIoSpace, _purecall, PsGetCurrentProcessId, PsProcessType, ObfDereferenceObject, RtlAppendUnicodeStringToString, RtlCompareUnicodeString, DbgPrintEx, RtlCopyUnicodeString, ExAllocatePoolWithTag, RtlEqualUnicodeString, ZwDeleteKey, ZwQueryValueKey, ZwOpenKey, ExDeleteResourceLite, KeEnterCriticalRegion, ExAcquireResourceExclusiveLite, ExReleaseResourceLite, ExInitializeResourceLite, KeLeaveCriticalRegion, ZwQueryInformationProcess, MmMapLockedPagesSpecifyCache, MmIsAddressValid, HalDispatchTable, RtlFreeUnicodeString, IoWMIRegistrationControl, MmGetSystemRoutineAddress, RtlGetVersion, RtlInitUnicodeString, IoFileObjectType, ExFreePoolWithTag |
WppRecorder.sys | WppAutoLogTrace, WppAutoLogStart, imp_WppRecorderGetTriageInfo, WppAutoLogStop |
WDFLDR.SYS | WdfVersionBind, WdfLdrQueryInterface, WdfVersionUnbind, WdfVersionUnbindClass, WdfVersionBindClass |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 11:50:55 |
Start date: | 22/10/2024 |
Path: | C:\Users\user\Desktop\MpKslDrv.sys |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7b4ee0000 |
File size: | 267'552 bytes |
MD5 hash: | 5AF325BDA4568A1A07FEE2195A80A188 |
Has elevated privileges: | |
Has administrator privileges: | |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |