Report - mimidrv.sys

UPX Antivirus PE64 PE File
ScreenShot
Created 2023.04.25 17:54 Machine s1_win7_x6403
Filename mimidrv.sys
Type PE32+ executable (native) x86-64, for MS Windows
AI Score
3
Behavior Score
1.6
ZERO API file : malware
VT API (file) 55 detected (Mimikatz, Windows, Hacktool, Malicious, score, unsafe, Tool, Sign, confidence, 100%, Delpy, Eldorado, jsrlpu, GenMaliciousA, CLASSIC, HKTL, MIMIKATZ64, HTool, Apteryx, ai score=89, Detected, R362174, SigAdware, BenjaminDelpy, susgen)
md5 3e528207ca374123f63789195a4aedde
sha256 d30f51bfd62695df96ba94cde14a7fae466b29ef45252c6ad19d57b4a87ff44e
ssdeep 768:6PVvAF3Sz0Kp4TC/ndBK8ipSPnA+vl1qlCGB8zlu0RVHZC5isg:mVvPz0K3EyDlQlHB8zl9RJwisg
imphash 059c6bd84285f4960e767f032b33f19b
impfuzzy 24:wzUJ2Pp8P4GoJN+yyzF2Mz9C8gtydHSPK16D8l+yJqBuq1ULERGDOfZRyBzVmiVy:uHOBzlkuJcfvhg42sf6lbjKD4vA
  Network IP location

Signature (3cnts)

Level Description
danger File has been identified by 55 AntiVirus engines on VirusTotal as malicious
info The executable contains unknown PE section names indicative of a packer (could be a false positive)
info This executable has a PDB path

Rules (4cnts)

Level Name Description Collection
watch Antivirus Contains references to security software binaries (upload)
watch UPX_Zero UPX packed file binaries (upload)
info IsPE64 (no description) binaries (upload)
info PE_Header_Zero PE File Signature binaries (upload)

Network (0cnts) ?

Request CC ASN Co IP4 Rule ? ZERO ?

Suricata ids

PE API

IAT(Import Address Table) Library

ntoskrnl.exe
 0x15030 KeBugCheck
 0x15038 IofCompleteRequest
 0x15040 IoCreateSymbolicLink
 0x15048 IoCreateDevice
 0x15050 PsProcessType
 0x15058 PsGetProcessImageFileName
 0x15060 PsLookupProcessByProcessId
 0x15068 PsReferencePrimaryToken
 0x15070 ZwOpenProcessTokenEx
 0x15078 IoGetCurrentProcess
 0x15080 ZwSetInformationProcess
 0x15088 ZwClose
 0x15090 ZwDuplicateToken
 0x15098 PsInitialSystemProcess
 0x150a0 _vsnwprintf
 0x150a8 ObfDereferenceObject
 0x150b0 ObOpenObjectByPointer
 0x150b8 PsGetProcessId
 0x150c0 PsDereferencePrimaryToken
 0x150c8 ExAllocatePoolWithTag
 0x150d0 ExFreePoolWithTag
 0x150d8 IoFreeMdl
 0x150e0 MmProbeAndLockPages
 0x150e8 MmUnlockPages
 0x150f0 IoAllocateMdl
 0x150f8 ZwUnloadKey
 0x15100 IoEnumerateRegisteredFiltersList
 0x15108 KeBugCheckEx
 0x15110 MmGetSystemRoutineAddress
 0x15118 IoDeleteDevice
 0x15120 RtlInitUnicodeString
 0x15128 NtBuildNumber
 0x15130 RtlCompareMemory
 0x15138 IoDeleteSymbolicLink
 0x15140 PsGetVersion
 0x15148 ExAllocatePoolWithQuotaTag
 0x15150 ZwQuerySystemInformation
 0x15158 RtlUnwindEx
FLTMGR.SYS
 0x15000 FltGetFilterInformation
 0x15008 FltEnumerateInstances
 0x15010 FltEnumerateFilters
 0x15018 FltObjectDereference
 0x15020 FltGetVolumeFromInstance

EAT(Export Address Table) is none



Similarity measure (PE file only) - Checking for service failure