G:\vcprj\PlugXP\Rootkit\i386\agony.pdb
Static task
static1
General
-
Target
174f33a5e19a1b3d2711c60011f51c70_JaffaCakes118
-
Size
158KB
-
MD5
174f33a5e19a1b3d2711c60011f51c70
-
SHA1
063c78040490b3d2d160eaead4f2ff7506df80ad
-
SHA256
2b3673b065985ec3038ac042f5837245c07a3c096c8b396b8adf5457d11a5cf4
-
SHA512
547333a12299092a1539ecfeb2f7c82d1fe6c35c600d5f941a0df984875d5d7b150363a2998e6bfc4d040b843317951716d12087f6e680024e5ecd37871f24ee
-
SSDEEP
3072:NvV+pxUTNfhaF6oXaCYmJu4MAfOO2FXvssz1ucR3tEPY6OtY26CLDBE1Dsb:Nv9fA4QJufYOOETucRmPY6OH6CLDBE16
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 174f33a5e19a1b3d2711c60011f51c70_JaffaCakes118
Files
-
174f33a5e19a1b3d2711c60011f51c70_JaffaCakes118.sys windows:5 windows x86 arch:x86
8faecd7644496a481b91d945d32cd9e9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ZwEnumerateValueKey
ExAllocatePoolWithTag
ExFreePoolWithTag
ZwClose
RtlInitUnicodeString
ObReferenceObjectByHandle
ZwOpenProcess
ZwQuerySystemInformation
KeDetachProcess
KeAttachProcess
DbgPrint
strncmp
IoGetCurrentProcess
KeDelayExecutionThread
ZwDeleteValueKey
ZwOpenKey
ZwSetValueKey
MmGetSystemRoutineAddress
MmMapLockedPages
MmBuildMdlForNonPagedPool
IoFreeMdl
MmUnmapLockedPages
ZwQueryVolumeInformationFile
ZwDeviceIoControlFile
ZwQueryDirectoryFile
_stricmp
IoRegisterDriverReinitialization
IoDeleteDevice
IoDeleteSymbolicLink
IofCompleteRequest
IoCreateSymbolicLink
PsGetCurrentProcessId
ZwEnumerateKey
swprintf
wcslen
hal
KfRaiseIrql
KeGetCurrentIrql
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 251B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 988B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ