Skip to content

Commit

Permalink
Merge pull request #184 from nasbench/reorder-fields
Browse files Browse the repository at this point in the history
chore: reorder fields
  • Loading branch information
MHaggis authored Aug 23, 2024
2 parents 3448c20 + b07e3ed commit a499365
Show file tree
Hide file tree
Showing 425 changed files with 335,024 additions and 333,846 deletions.
417 changes: 209 additions & 208 deletions yaml/0258df5c-c3c1-4ed5-ba8f-846d91526ffe.yaml

Large diffs are not rendered by default.

397 changes: 199 additions & 198 deletions yaml/02e4a30f-8aa8-4ff0-8e02-1bff1d0f088f.yaml

Large diffs are not rendered by default.

23,109 changes: 11,574 additions & 11,535 deletions yaml/043773c5-120a-4c6b-8485-8f1f5c47fd3e.yaml

Large diffs are not rendered by default.

688 changes: 344 additions & 344 deletions yaml/04d377f9-36e0-42a4-8d47-62232163dc68.yaml

Large diffs are not rendered by default.

10,655 changes: 5,332 additions & 5,323 deletions yaml/0567c6c4-282f-406f-9369-7f876b899c25.yaml

Large diffs are not rendered by default.

86 changes: 43 additions & 43 deletions yaml/058fb356-e0ff-4f5e-8293-319feb005db2.yaml
Original file line number Diff line number Diff line change
@@ -1,48 +1,48 @@
Acknowledgement:
Handle: ''
Person: ''
Id: 058fb356-e0ff-4f5e-8293-319feb005db2
Tags:
- bandai.sys
Verified: 'FALSE'
Author: Michael Haag
Category: vulnerable driver
Commands:
Command: sc.exe create bandai.sys binPath=C:\windows\temp\bandai.sys type=kernel
&& sc.exe start bandai.sys
Description: ''
OperatingSystem: Windows 10
Privileges: kernel
Usecase: Elevate privileges
Created: '2023-01-09'
Detection: []
Id: 058fb356-e0ff-4f5e-8293-319feb005db2
KnownVulnerableSamples:
- Company: ''
Date: ''
Description: ''
FileVersion: ''
Filename: bandai.sys
MachineType: ''
OriginalFilename: ''
Product: ''
ProductVersion: ''
Publisher: ''
SHA1: 0f780b7ada5dd8464d9f2cc537d973f5ac804e9c
Signature: []
LoadsDespiteHVCI: 'FALSE'
- Company: ''
Date: ''
Description: ''
FileVersion: ''
Filename: bandai.sys
MachineType: ''
OriginalFilename: ''
Product: ''
ProductVersion: ''
Publisher: ''
SHA1: ea360a9f23bb7cf67f08b88e6a185a699f0c5410
Signature: []
LoadsDespiteHVCI: 'FALSE'
MitreID: T1068
Category: vulnerable driver
Commands:
Command: sc.exe create bandai.sys binPath=C:\windows\temp\bandai.sys type=kernel
&& sc.exe start bandai.sys
Description: ''
OperatingSystem: Windows 10
Privileges: kernel
Usecase: Elevate privileges
Resources:
- https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules
Tags:
- bandai.sys
Verified: 'FALSE'
Detection: []
Acknowledgement:
Handle: ''
Person: ''
KnownVulnerableSamples:
- Company: ''
Date: ''
Description: ''
FileVersion: ''
Filename: bandai.sys
MachineType: ''
OriginalFilename: ''
Product: ''
ProductVersion: ''
Publisher: ''
SHA1: 0f780b7ada5dd8464d9f2cc537d973f5ac804e9c
Signature: []
LoadsDespiteHVCI: 'FALSE'
- Company: ''
Date: ''
Description: ''
FileVersion: ''
Filename: bandai.sys
MachineType: ''
OriginalFilename: ''
Product: ''
ProductVersion: ''
Publisher: ''
SHA1: ea360a9f23bb7cf67f08b88e6a185a699f0c5410
Signature: []
LoadsDespiteHVCI: 'FALSE'
254 changes: 127 additions & 127 deletions yaml/0590655c-baa2-481a-b909-463534bd7a5e.yaml
Original file line number Diff line number Diff line change
@@ -1,134 +1,134 @@
Acknowledgement:
Handle: ''
Person: ''
Id: 0590655c-baa2-481a-b909-463534bd7a5e
Tags:
- daxin_blank5.sys
Verified: 'TRUE'
Author: Michael Haag
Category: malicious
Commands:
Command: sc.exe create daxin_blank5.sys binPath=C:\windows\temp\daxin_blank5.sys type=kernel
&& sc.exe start daxin_blank5.sys
Description: Driver used in the Daxin malware campaign.
OperatingSystem: Windows 10
Privileges: kernel
Usecase: Elevate privileges
Created: '2023-02-28'
Detection: []
Id: 0590655c-baa2-481a-b909-463534bd7a5e
KnownVulnerableSamples:
- Authentihash:
MD5: da0d70a9fd3a61a2802af4a07bed29d4
SHA1: 99a969b2deded8b2d403268cd49139463c06b484
SHA256: 954789c665098cf491a9bdf4e04886bad8992a393f91ccbca239bff40cc6dca6
Company: ''
Copyright: ''
CreationTimestamp: '2008-07-17 19:29:43'
Date: ''
Description: ''
ExportedFunctions: ''
FileVersion: ''
Filename: daxin_blank5.sys
ImportedFunctions:
- MmUnlockPages
- KeInsertQueueApc
- strncmp
- KeInitializeApc
- MmProbeAndLockPages
- IoAllocateMdl
- _except_handler3
- IoQueueWorkItem
- KeAttachProcess
- KeDetachProcess
- IoGetCurrentProcess
- IoFreeWorkItem
- RtlFreeUnicodeString
- ZwClose
- ZwWriteFile
- ZwCreateFile
- RtlAnsiStringToUnicodeString
- IofCompleteRequest
- ExFreePool
- ExAllocatePoolWithTag
- InterlockedDecrement
- MmMapLockedPagesSpecifyCache
- IoFreeMdl
- InterlockedExchange
- InterlockedIncrement
- swprintf
- RtlCopyUnicodeString
- ExfInterlockedInsertTailList
- wcsncmp
- IoCreateSymbolicLink
- RtlInitUnicodeString
- IoCreateDevice
- IoDeleteSymbolicLink
- KeInitializeSpinLock
- IoDeleteDevice
- _strnicmp
- ExfInterlockedRemoveHeadList
- IoAllocateWorkItem
- KfAcquireSpinLock
- KfReleaseSpinLock
- NdisAllocateMemory
- NdisFreePacket
- NdisAllocatePacket
- NdisResetEvent
- NdisCloseAdapter
- NdisAllocateBuffer
- NdisInitializeEvent
- NdisOpenAdapter
- NdisFreeMemory
- NdisQueryAdapterInstanceName
- NdisDeregisterProtocol
- NdisSetEvent
- NdisFreeBufferPool
- NdisAllocatePacketPool
- NdisFreePacketPool
- NdisRegisterProtocol
- NdisWaitEvent
- NdisAllocateBufferPool
- NdisCopyFromPacketToPacket
Imports:
- ntoskrnl.exe
- HAL.dll
- NDIS.SYS
InternalName: ''
MD5: f242cffd9926c0ccf94af3bf16b6e527
MachineType: I386
MagicHeader: 50 45 0 0
OriginalFilename: ''
Product: ''
ProductVersion: ''
Publisher: n/a
RichPEHeaderHash:
MD5: 6c5319c52cabf708cac1121ed7df420b
SHA1: 4d9f5c969d83ff20b202263d6d4a38aed8deb9f3
SHA256: cb3c84a0789027aef0c0aef452da254f600b2f17ed53054a5a68765f708302d4
SHA1: 53f776d9a183c42b93960b270dddeafba74eb3fb
SHA256: 9c2f3e9811f7d0c7463eaa1ee6f39c23f902f3797b80891590b43bbe0fdf0e51
Sections:
.text:
Entropy: 6.333612663607225
Virtual Size: '0x3146'
.rdata:
Entropy: 3.9544250034604453
Virtual Size: '0x104'
.data:
Entropy: 2.1263450977868867
Virtual Size: '0x4ec9c'
INIT:
Entropy: 5.2278974725553775
Virtual Size: '0x62e'
.reloc:
Entropy: 4.026524390647434
Virtual Size: '0x724'
Signature: Unsigned
Signatures: {}
Imphash: a09170ef09c55cdca9472c02cb1f2647
LoadsDespiteHVCI: 'TRUE'
MitreID: T1068
Category: malicious
Commands:
Command: sc.exe create daxin_blank5.sys binPath=C:\windows\temp\daxin_blank5.sys type=kernel
&& sc.exe start daxin_blank5.sys
Description: Driver used in the Daxin malware campaign.
OperatingSystem: Windows 10
Privileges: kernel
Usecase: Elevate privileges
Resources:
- https://gist.github.com/MHaggis/9ab3bb795a6018d70fb11fa7c31f8f48
- https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage
- ''
Tags:
- daxin_blank5.sys
Verified: 'TRUE'
Detection: []
Acknowledgement:
Handle: ''
Person: ''
KnownVulnerableSamples:
- Authentihash:
MD5: da0d70a9fd3a61a2802af4a07bed29d4
SHA1: 99a969b2deded8b2d403268cd49139463c06b484
SHA256: 954789c665098cf491a9bdf4e04886bad8992a393f91ccbca239bff40cc6dca6
Company: ''
Copyright: ''
CreationTimestamp: '2008-07-17 19:29:43'
Date: ''
Description: ''
ExportedFunctions: ''
FileVersion: ''
Filename: daxin_blank5.sys
ImportedFunctions:
- MmUnlockPages
- KeInsertQueueApc
- strncmp
- KeInitializeApc
- MmProbeAndLockPages
- IoAllocateMdl
- _except_handler3
- IoQueueWorkItem
- KeAttachProcess
- KeDetachProcess
- IoGetCurrentProcess
- IoFreeWorkItem
- RtlFreeUnicodeString
- ZwClose
- ZwWriteFile
- ZwCreateFile
- RtlAnsiStringToUnicodeString
- IofCompleteRequest
- ExFreePool
- ExAllocatePoolWithTag
- InterlockedDecrement
- MmMapLockedPagesSpecifyCache
- IoFreeMdl
- InterlockedExchange
- InterlockedIncrement
- swprintf
- RtlCopyUnicodeString
- ExfInterlockedInsertTailList
- wcsncmp
- IoCreateSymbolicLink
- RtlInitUnicodeString
- IoCreateDevice
- IoDeleteSymbolicLink
- KeInitializeSpinLock
- IoDeleteDevice
- _strnicmp
- ExfInterlockedRemoveHeadList
- IoAllocateWorkItem
- KfAcquireSpinLock
- KfReleaseSpinLock
- NdisAllocateMemory
- NdisFreePacket
- NdisAllocatePacket
- NdisResetEvent
- NdisCloseAdapter
- NdisAllocateBuffer
- NdisInitializeEvent
- NdisOpenAdapter
- NdisFreeMemory
- NdisQueryAdapterInstanceName
- NdisDeregisterProtocol
- NdisSetEvent
- NdisFreeBufferPool
- NdisAllocatePacketPool
- NdisFreePacketPool
- NdisRegisterProtocol
- NdisWaitEvent
- NdisAllocateBufferPool
- NdisCopyFromPacketToPacket
Imports:
- ntoskrnl.exe
- HAL.dll
- NDIS.SYS
InternalName: ''
MD5: f242cffd9926c0ccf94af3bf16b6e527
MachineType: I386
MagicHeader: 50 45 0 0
OriginalFilename: ''
Product: ''
ProductVersion: ''
Publisher: n/a
RichPEHeaderHash:
MD5: 6c5319c52cabf708cac1121ed7df420b
SHA1: 4d9f5c969d83ff20b202263d6d4a38aed8deb9f3
SHA256: cb3c84a0789027aef0c0aef452da254f600b2f17ed53054a5a68765f708302d4
SHA1: 53f776d9a183c42b93960b270dddeafba74eb3fb
SHA256: 9c2f3e9811f7d0c7463eaa1ee6f39c23f902f3797b80891590b43bbe0fdf0e51
Sections:
.text:
Entropy: 6.333612663607225
Virtual Size: '0x3146'
.rdata:
Entropy: 3.9544250034604453
Virtual Size: '0x104'
.data:
Entropy: 2.1263450977868867
Virtual Size: '0x4ec9c'
INIT:
Entropy: 5.2278974725553775
Virtual Size: '0x62e'
.reloc:
Entropy: 4.026524390647434
Virtual Size: '0x724'
Signature: Unsigned
Signatures: {}
Imphash: a09170ef09c55cdca9472c02cb1f2647
LoadsDespiteHVCI: 'TRUE'
Loading

0 comments on commit a499365

Please sign in to comment.