G:\vcprj\PluginNT\RootKit\i386\agony.pdb
Static task
static1
General
-
Target
4462ed441cd5a4817ee1e27af427111a_JaffaCakes118
-
Size
83KB
-
MD5
4462ed441cd5a4817ee1e27af427111a
-
SHA1
62b825964ea6c0b634493b1999d086ab802699bc
-
SHA256
08ddc0e43354deaba8312882e115802aa0c31f77a0f71065e9629ea42cd9a40a
-
SHA512
ee957976adca63c930909fbe08521b01c63fd96701a27d708b2be89d699ac129ebf8b5b0aae19d516b222b79cd3664490e6dfd5446725eea1412aa935f2f2eee
-
SSDEEP
1536:5vslIrv1vw9VBpIUkt1Oq+WUZ5jr8G5TBxf3:Cc9vw9VBpILt11Q50G5T/f3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4462ed441cd5a4817ee1e27af427111a_JaffaCakes118
Files
-
4462ed441cd5a4817ee1e27af427111a_JaffaCakes118.sys windows:5 windows x86 arch:x86
746e22f2a262c389a3d58090ef433775
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
wcslen
ZwEnumerateValueKey
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
KeServiceDescriptorTable
IoFreeMdl
MmUnmapLockedPages
ZwQueryVolumeInformationFile
ZwDeviceIoControlFile
ZwQueryDirectoryFile
ZwQuerySystemInformation
IofCompleteRequest
ExAllocatePoolWithTag
ZwClose
ZwCreateFile
RtlInitUnicodeString
strncmp
ZwDeleteValueKey
ZwOpenKey
ZwSetValueKey
ZwReadFile
ZwOpenFile
ZwWriteFile
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
ZwEnumerateKey
wcsrchr
ExFreePoolWithTag
ZwQueryValueKey
ZwCreateKey
KeDelayExecutionThread
PsLookupProcessByProcessId
IoDeleteDevice
IoDeleteSymbolicLink
PsSetCreateProcessNotifyRoutine
IoRegisterDriverReinitialization
PsCreateSystemThread
IoCreateSymbolicLink
IoCreateDevice
ZwQueryInformationFile
ZwAdjustPrivilegesToken
ZwOpenProcessToken
wcscmp
_alldiv
ObReferenceObjectByHandle
ZwOpenProcess
_strnicmp
MmIsAddressValid
KeDetachProcess
MmHighestUserAddress
ZwQueryInformationProcess
KeAttachProcess
IoGetCurrentProcess
swprintf
_stricmp
hal
KfRaiseIrql
KeGetCurrentIrql
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 333B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ