G:\vcprj\PluginNT\RootKit\i386\agony.pdb
Static task
static1
General
-
Target
e1104bfdeb1bc98e1d8abd45d8c4c84f_JaffaCakes118
-
Size
80KB
-
MD5
e1104bfdeb1bc98e1d8abd45d8c4c84f
-
SHA1
d6178fc207514a940dcc5662ebe04f2d9dfdd7f3
-
SHA256
9373b2235c233d179124ec749424abc81bb5837aea97705cc9ea81736809c3cf
-
SHA512
3d6c31305477a7d305e3d88a701cd5c76e1e04211c84e890668f27623e539b55f8e32ad38ef2373742265a488f977664a6d1c024399a3017d546159d57a16a3c
-
SSDEEP
1536:rqNRhdYFpJT3jE5C5QwAcGOETZlqwkSQjT3TGB/sAbd:QhdYZ5HG0wkSw3T2/sAB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1104bfdeb1bc98e1d8abd45d8c4c84f_JaffaCakes118
Files
-
e1104bfdeb1bc98e1d8abd45d8c4c84f_JaffaCakes118.sys windows:5 windows x86 arch:x86
b3f700a764ba6b8598256d2514ac4811
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
KeServiceDescriptorTable
IoFreeMdl
MmUnmapLockedPages
ZwQueryVolumeInformationFile
ZwDeviceIoControlFile
ZwEnumerateValueKey
ZwEnumerateKey
ZwQueryDirectoryFile
ZwQuerySystemInformation
IofCompleteRequest
ExAllocatePoolWithTag
wcslen
ZwClose
ZwCreateFile
RtlInitUnicodeString
strncmp
IoGetCurrentProcess
ZwDeleteValueKey
ZwOpenKey
ZwSetValueKey
ZwReadFile
ZwOpenFile
ZwWriteFile
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
swprintf
MmCreateMdl
ExFreePoolWithTag
ZwQueryValueKey
ZwCreateKey
KeDelayExecutionThread
_stricmp
PsLookupProcessByProcessId
IoDeleteDevice
IoDeleteSymbolicLink
PsSetCreateProcessNotifyRoutine
IoRegisterDriverReinitialization
PsCreateSystemThread
IoCreateSymbolicLink
IoCreateDevice
ZwQueryInformationFile
ZwAdjustPrivilegesToken
ZwOpenProcessToken
wcscmp
_alldiv
ObReferenceObjectByHandle
ZwOpenProcess
_strnicmp
MmIsAddressValid
KeDetachProcess
MmHighestUserAddress
ZwQueryInformationProcess
KeAttachProcess
MmBuildMdlForNonPagedPool
wcsrchr
MmMapLockedPages
hal
KfRaiseIrql
KeGetCurrentIrql
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 333B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ