G:\vcprj\PluginNT\RootKit\i386\agony.pdb
Static task
static1
Behavioral task
behavioral1
Sample
313499da7d532d84d3341d933de6e54e_JaffaCakes118.sys
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
313499da7d532d84d3341d933de6e54e_JaffaCakes118.sys
Resource
win10v2004-20240709-en
General
-
Target
313499da7d532d84d3341d933de6e54e_JaffaCakes118
-
Size
80KB
-
MD5
313499da7d532d84d3341d933de6e54e
-
SHA1
3980cc3b3490d27e5f131df9befd74e60388ab8b
-
SHA256
12492d11e94b14ed9b1acbad8bd9cbbd1cccac87e13d687c6513f12e1febbc72
-
SHA512
369038fd6a01a420a5f2b13f4fa192f956058ebf60a056744aa4ea723e6cb3adb705b16d0a4298310837ac6e51d2ee9bdc7c42e8cfb712dc60a90acd40105515
-
SSDEEP
1536:rqGQYeFCjszzROGpp3PLx1EAn84A+17Castp13+9kTLh6mL5uO+:pQYe4epp3Tx1T8JM7Castp1uiTLzL8O+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 313499da7d532d84d3341d933de6e54e_JaffaCakes118
Files
-
313499da7d532d84d3341d933de6e54e_JaffaCakes118.sys .js windows:5 windows x86 arch:x86 polyglot
c3e3fb7e5ea049e1217f8a55f35884ea
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmCreateMdl
KeServiceDescriptorTable
IoFreeMdl
MmUnmapLockedPages
ZwQueryVolumeInformationFile
ZwDeviceIoControlFile
ZwEnumerateValueKey
ZwEnumerateKey
ZwQueryDirectoryFile
ZwQuerySystemInformation
IofCompleteRequest
ExAllocatePoolWithTag
ZwClose
ZwCreateFile
RtlInitUnicodeString
strncmp
IoGetCurrentProcess
ZwDeleteValueKey
ZwOpenKey
ZwSetValueKey
ZwReadFile
ZwOpenFile
ZwWriteFile
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
swprintf
MmBuildMdlForNonPagedPool
ExFreePoolWithTag
ZwQueryValueKey
ZwCreateKey
KeDelayExecutionThread
_stricmp
PsLookupProcessByProcessId
IoDeleteDevice
IoDeleteSymbolicLink
PsSetCreateProcessNotifyRoutine
IoRegisterDriverReinitialization
PsCreateSystemThread
IoCreateSymbolicLink
IoCreateDevice
ZwQueryInformationFile
ZwAdjustPrivilegesToken
ZwOpenProcessToken
wcscmp
_alldiv
ObReferenceObjectByHandle
ZwOpenProcess
_strnicmp
MmIsAddressValid
KeDetachProcess
MmHighestUserAddress
ZwQueryInformationProcess
KeAttachProcess
MmMapLockedPages
wcsrchr
wcslen
hal
KfRaiseIrql
KeGetCurrentIrql
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 333B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ