f8bddc8b-49b9-41f7-a877-d15ec3f174f9
daxin_blank4.sys
Description
Driver used in the Daxin malware campaign.
This download link contains the malicious driver!
Commands
sc.exe create daxin_blank4.sys binPath=C:\windows\temp\daxin_blank4.sys type=kernel && sc.exe start daxin_blank4.sys
Use Case | Privileges | Operating System |
---|---|---|
Elevate privileges | kernel | Windows 10 |
Detections
YARA 🏹
Resources
Known Vulnerable Samples
Property | Value |
---|---|
Filename | daxin_blank4.sys |
Creation Timestamp | 2010-04-20 02:42:35 |
MD5 | 491aec2249ad8e2020f9f9b559ab68a8 |
SHA1 | 8692274681e8d10c26ddf2b993f31974b04f5bf0 |
SHA256 | 8dafe5f3d0527b66f6857559e3c81872699003e0f2ffda9202a1b5e29db2002e |
Authentihash MD5 | f66f4d6b97b9e7b0e467daed2ed69bed |
Authentihash SHA1 | c8f227b45d27c43db4b661ef610efbfacfda8a75 |
Authentihash SHA256 | 15b081ec83a89182b5bb0a642d56513f40810b5b0a42e904ab6d3fa8f34c0446 |
RichPEHeaderHash MD5 | 1381b25bf0ced4095e632696cc69b688 |
RichPEHeaderHash SHA1 | 430cd24c4929262cae66fffe4f3aea3e2f1a7d4e |
RichPEHeaderHash SHA256 | 8fa76d4c6994c56e80ca822d3f346cbd3934333a2dfa1ea7c7800023b27efe04 |
Publisher | n/a |
Imports
Expand
- NTOSKRNL.EXE
- HAL.DLL
- ntoskrnl.exe
- NDIS.SYS
Imported Functions
Expand
- strlen
- IoFreeMdl
- MmMapLockedPagesSpecifyCache
- ZwClose
- IofCompleteRequest
- KeResetEvent
- InterlockedIncrement
- KeSetEvent
- InterlockedDecrement
- RtlUnicodeStringToInteger
- RtlInitUnicodeString
- KeInitializeEvent
- wcsncmp
- wcscat
- wcslen
- wcscpy
- MmBuildMdlForNonPagedPool
- IoAllocateMdl
- strncmp
- MmMapLockedPages
- MmProbeAndLockPages
- MmUnlockPages
- MmUnmapLockedPages
- RtlFreeUnicodeString
- ZwWriteFile
- ZwCreateFile
- RtlAnsiStringToUnicodeString
- strcat
- ZwReadFile
- ZwQueryInformationFile
- _wcsnicmp
- strcmp
- _stricmp
- MmGetSystemRoutineAddress
- ZwQueryValueKey
- ZwOpenKey
- IoCreateFile
- KeWaitForMultipleObjects
- strcpy
- RtlUnwind
- vsprintf
- KeWaitForSingleObject
- KeDelayExecutionThread
- PsTerminateSystemThread
- PsCreateSystemThread
- ObReferenceObjectByHandle
- ExFreePool
- KeInitializeSpinLock
- KeTickCount
- memset
- memcpy
- RtlCompareUnicodeString
- ExAllocatePoolWithTag
- KfAcquireSpinLock
- KfReleaseSpinLock
- PsGetVersion
- ZwTerminateProcess
- ZwOpenProcess
- RtlSetDaclSecurityDescriptor
- RtlAddAccessAllowedAce
- RtlCreateAcl
- RtlLengthSid
- RtlCreateSecurityDescriptor
- ZwWaitForSingleObject
- NtFsControlFile
- NtWriteFile
- NtReadFile
- RtlLengthRequiredSid
- RtlImageDirectoryEntryToData
- ZwQueryInformationProcess
- ZwQuerySystemInformation
- PsLookupProcessByProcessId
- KeAttachProcess
- KeDetachProcess
- PsLookupThreadByThreadId
- KeInitializeApc
- KeInsertQueueApc
- ZwOpenFile
- ZwDeviceIoControlFile
- PsThreadType
- NtQuerySystemInformation
- NdisAllocateMemory
- NdisAllocatePacket
- NdisCopyFromPacketToPacket
- NdisFreePacket
- NdisAllocateBuffer
- NdisDeregisterProtocol
- NdisRegisterProtocol
- NdisAllocateBufferPool
- NdisAllocatePacketPool
- NdisFreeBufferPool
- NdisFreePacketPool
- NdisFreeMemory
Exported Functions
Expand
Sections
Expand
- .text
- .rdata
- .data
- INIT
- .vmp0
- .vmp1
- .reloc
Signature
Expand
last_updated: 2024-09-26