73bd234a-6c4f-4304-9e7d-5bc7a3f263e2
bd1f381e5a3db22e88776b7873d4d2835e9a1ec620571d2b1da0c58f81c84a56 
Description
hlpdrv.sys is a malicious driver used to disable Windows Defender by modifying registry settings. This driver has been observed in Akira ransomware campaigns, where it is deployed to facilitate AV/EDR evasion or disablement through a Bring Your Own Vulnerable Driver (BYOVD) exploitation chain. The malware modifies the DisableAntiSpyware registry key via regedit.exe execution.
- UUID: 73bd234a-6c4f-4304-9e7d-5bc7a3f263e2
- Created: 2025-10-27
- Author: Michael Haag
- Acknowledgement: GuidePoint Research and Intelligence Team (GRIT) | @GuidepointSec
Commands
sc.exe create KMHLPSVC binPath=C:\windows\temp\hlpdrv.sys type=kernel && sc.exe start KMHLPSVC
| Use Case | Privileges | Operating System |
|---|---|---|
| Elevate privileges | kernel | Windows 10 |
Detections
YARA 🏹
Expand
Resources
Known Vulnerable Samples
| Property | Value |
|---|---|
| Filename | hlpdrv.sys |
| Creation Timestamp | 2025-03-03 04:11:32 |
| MD5 | cf7cad39407d8cd93135be42b6bd258f |
| SHA1 | ce1b9909cef820e5281618a7a0099a27a70643dc |
| SHA256 | bd1f381e5a3db22e88776b7873d4d2835e9a1ec620571d2b1da0c58f81c84a56 |
| Authentihash MD5 | 3e1467f89f1d0e6ff341afd460b61997 |
| Authentihash SHA1 | 7be5524927a472e0d6fbb80767fdf1ff1aa4dffc |
| Authentihash SHA256 | a22d5d42dd0cdae016b536799ab9c384c23b42f5662f0b115b3b85ccb9e23242 |
| RichPEHeaderHash MD5 | fddfc403cd9bf71fe6619635b05aac6e |
| RichPEHeaderHash SHA1 | 350c2cbd34cb87b6e06a25c63b3e48ce30a71f15 |
| RichPEHeaderHash SHA256 | b78be3efd3d5c31d858ac832f0ee71fdb7e04a4628f2c0d897e838fa3e8f3866 |
Imports
Expand
- ntoskrnl.exe
Imported Functions
Expand
- RtlInitUnicodeString
- DbgPrint
- RtlCreateSecurityDescriptor
- RtlSetDaclSecurityDescriptor
- ExAllocatePoolWithTag
- ExFreePoolWithTag
- IofCompleteRequest
- IoCreateDevice
- IoCreateSymbolicLink
- IoDeleteDevice
- IoDeleteSymbolicLink
- ZwCreateFile
- ZwClose
- ZwTerminateProcess
- RtlCreateAcl
- SeLocateProcessImageName
- PsLookupProcessByProcessId
- ObOpenObjectByPointer
- ZwSetSecurityObject
- PsProcessType
Exported Functions
Expand
Sections
Expand
- .text
- .rdata
- .data
- .pdata
- INIT
- .reloc
Signature
Expand
last_updated: 2026-01-07