G:\vcprj\PluginNT\RootKit\i386\agony.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0e4511cca61a7c3fac8b76efce2ad492_JaffaCakes118.sys
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e4511cca61a7c3fac8b76efce2ad492_JaffaCakes118.sys
Resource
win10v2004-20240508-en
General
-
Target
0e4511cca61a7c3fac8b76efce2ad492_JaffaCakes118
-
Size
80KB
-
MD5
0e4511cca61a7c3fac8b76efce2ad492
-
SHA1
af1a2c94ab9dd110fd98c414e5039108f2e49eb6
-
SHA256
a1ca5c58232177c307f61016db0a8f99526a51ce6b6c586f7756ae1dd88f02e4
-
SHA512
73989540d90f647a886a89f261076a1d9aba837090abeb78856efe0730a133ce0323bf5d8ce9e7ecff6a96a2362446f4b319af6edc89830aad7c0d4a910505e5
-
SSDEEP
1536:rq9QYeFCjszz5OGpp3PLx1EAn84A+17Castp13+9kTLhO/1gHS5uO+:2QYe4Opp3Tx1T8JM7Castp1uiTLk/iSK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e4511cca61a7c3fac8b76efce2ad492_JaffaCakes118
Files
-
0e4511cca61a7c3fac8b76efce2ad492_JaffaCakes118.sys .js windows:5 windows x86 arch:x86 polyglot
c3e3fb7e5ea049e1217f8a55f35884ea
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmCreateMdl
KeServiceDescriptorTable
IoFreeMdl
MmUnmapLockedPages
ZwQueryVolumeInformationFile
ZwDeviceIoControlFile
ZwEnumerateValueKey
ZwEnumerateKey
ZwQueryDirectoryFile
ZwQuerySystemInformation
IofCompleteRequest
ExAllocatePoolWithTag
ZwClose
ZwCreateFile
RtlInitUnicodeString
strncmp
IoGetCurrentProcess
ZwDeleteValueKey
ZwOpenKey
ZwSetValueKey
ZwReadFile
ZwOpenFile
ZwWriteFile
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
swprintf
MmBuildMdlForNonPagedPool
ExFreePoolWithTag
ZwQueryValueKey
ZwCreateKey
KeDelayExecutionThread
_stricmp
PsLookupProcessByProcessId
IoDeleteDevice
IoDeleteSymbolicLink
PsSetCreateProcessNotifyRoutine
IoRegisterDriverReinitialization
PsCreateSystemThread
IoCreateSymbolicLink
IoCreateDevice
ZwQueryInformationFile
ZwAdjustPrivilegesToken
ZwOpenProcessToken
wcscmp
_alldiv
ObReferenceObjectByHandle
ZwOpenProcess
_strnicmp
MmIsAddressValid
KeDetachProcess
MmHighestUserAddress
ZwQueryInformationProcess
KeAttachProcess
MmMapLockedPages
wcsrchr
wcslen
hal
KfRaiseIrql
KeGetCurrentIrql
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 333B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ