G:\vcprj\PluginNT\RootKit\i386\agony.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8495acb730ccd741b37c9a5d507570c2_JaffaCakes118.sys
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8495acb730ccd741b37c9a5d507570c2_JaffaCakes118.sys
Resource
win10v2004-20240802-en
General
-
Target
8495acb730ccd741b37c9a5d507570c2_JaffaCakes118
-
Size
80KB
-
MD5
8495acb730ccd741b37c9a5d507570c2
-
SHA1
d6f422693dd817ca29dfc162155080736cfbc36d
-
SHA256
55a63436dc48c0ac8df5e652e2333856e129321c6884ec51664dae9723ad9739
-
SHA512
68ca8566f833035549c45bb71b86f3b795f1af61ddf0b0d5d612ad42111b3a2ccf9d09f7d1f46ebe2903726b341346eb43758d4eb875b17004597a2b6e408ff9
-
SSDEEP
1536:rq5QYeFCjszzJOGpp3PLx1EA7JQ3kAvYoAmXtbsaNw7HeSMqy5uO+:yQYe42pp3Tx1u3kYYoA5wwjeSMqy8O+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8495acb730ccd741b37c9a5d507570c2_JaffaCakes118
Files
-
8495acb730ccd741b37c9a5d507570c2_JaffaCakes118.sys .js windows:5 windows x86 arch:x86 polyglot
c3e3fb7e5ea049e1217f8a55f35884ea
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmCreateMdl
KeServiceDescriptorTable
IoFreeMdl
MmUnmapLockedPages
ZwQueryVolumeInformationFile
ZwDeviceIoControlFile
ZwEnumerateValueKey
ZwEnumerateKey
ZwQueryDirectoryFile
ZwQuerySystemInformation
IofCompleteRequest
ExAllocatePoolWithTag
ZwClose
ZwCreateFile
RtlInitUnicodeString
strncmp
IoGetCurrentProcess
ZwDeleteValueKey
ZwOpenKey
ZwSetValueKey
ZwReadFile
ZwOpenFile
ZwWriteFile
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
swprintf
MmBuildMdlForNonPagedPool
ExFreePoolWithTag
ZwQueryValueKey
ZwCreateKey
KeDelayExecutionThread
_stricmp
PsLookupProcessByProcessId
IoDeleteDevice
IoDeleteSymbolicLink
PsSetCreateProcessNotifyRoutine
IoRegisterDriverReinitialization
PsCreateSystemThread
IoCreateSymbolicLink
IoCreateDevice
ZwQueryInformationFile
ZwAdjustPrivilegesToken
ZwOpenProcessToken
wcscmp
_alldiv
ObReferenceObjectByHandle
ZwOpenProcess
_strnicmp
MmIsAddressValid
KeDetachProcess
MmHighestUserAddress
ZwQueryInformationProcess
KeAttachProcess
MmMapLockedPages
wcsrchr
wcslen
hal
KfRaiseIrql
KeGetCurrentIrql
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 333B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ