<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
    <title>0xArchive</title>
    <subtitle>Deep dives into Windows Internals and Kernel-mode rootkit analysis.</subtitle>
    <link rel="self" type="application/atom+xml" href="https://malware-lab-source.pages.dev/atom.xml"/>
    <link rel="alternate" type="text/html" href="https://malware-lab-source.pages.dev"/>
    <generator uri="https://www.getzola.org/">Zola</generator>
    <updated>2026-05-16T00:00:00+00:00</updated>
    <id>https://malware-lab-source.pages.dev/atom.xml</id>
    <entry xml:lang="en">
        <title>Analyzing a Kernel-Mode Rootkit: Part 1</title>
        <published>2026-05-16T00:00:00+00:00</published>
        <updated>2026-05-16T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://malware-lab-source.pages.dev/posts/malware-cikk/"/>
        <id>https://malware-lab-source.pages.dev/posts/malware-cikk/</id>
        
        <content type="html" xml:base="https://malware-lab-source.pages.dev/posts/malware-cikk/">&lt;p&gt;In this initial installment, we dive deep into the mechanics of a sophisticated kernel-mode rootkit recently discovered in the wild. This malware specifically targets Windows x64 environments, utilizing advanced Direct Kernel Object Manipulation (DKOM) techniques to achieve persistent stealth.&lt;&#x2F;p&gt;
&lt;h2 id=&quot;hooking-ssdt-system-service-dispatch-table&quot;&gt;Hooking SSDT (System Service Dispatch Table)&lt;&#x2F;h2&gt;
&lt;p&gt;The rootkit&#x27;s primary evasion mechanism involves intercepting system calls. While PatchGuard (KPP) typically prevents arbitrary modification of the SSDT, this particular strain leverages a novel bypass involving a vulnerable driver primitive to flip the necessary bits.&lt;&#x2F;p&gt;
&lt;pre class=&quot;giallo&quot; style=&quot;color: #F8F8F2; background-color: #282A36;&quot;&gt;&lt;code data-lang=&quot;cpp&quot;&gt;&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #8BE9FD;font-style: italic;&quot;&gt;NTSTATUS&lt;&#x2F;span&gt;&lt;span style=&quot;color: #50FA7B;&quot;&gt; HookSystemService&lt;&#x2F;span&gt;&lt;span&gt;(&lt;&#x2F;span&gt;&lt;span style=&quot;color: #8BE9FD;font-style: italic;&quot;&gt;ULONG&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FFB86C;font-style: italic;&quot;&gt; ServiceIndex&lt;&#x2F;span&gt;&lt;span&gt;,&lt;&#x2F;span&gt;&lt;span style=&quot;color: #8BE9FD;font-style: italic;&quot;&gt; PVOID&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FFB86C;font-style: italic;&quot;&gt; HookFunction&lt;&#x2F;span&gt;&lt;span&gt;,&lt;&#x2F;span&gt;&lt;span style=&quot;color: #8BE9FD;font-style: italic;&quot;&gt; PVOID&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;*&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FFB86C;font-style: italic;&quot;&gt; OriginalFunction&lt;&#x2F;span&gt;&lt;span&gt;) {&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #6272A4;&quot;&gt;    &#x2F;&#x2F; Locate the SSDT&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span&gt;    PSYSTEM_SERVICE_TABLE Ssdt &lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;=&lt;&#x2F;span&gt;&lt;span style=&quot;color: #50FA7B;&quot;&gt; GetKeServiceDescriptorTable&lt;&#x2F;span&gt;&lt;span&gt;();&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;    if&lt;&#x2F;span&gt;&lt;span&gt; (&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;!&lt;&#x2F;span&gt;&lt;span&gt;Ssdt)&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt; return&lt;&#x2F;span&gt;&lt;span&gt; STATUS_UNSUCCESSFUL;&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span&gt;    PULONG ServiceTableBase &lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;=&lt;&#x2F;span&gt;&lt;span&gt; (PULONG)Ssdt&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;-&amp;gt;&lt;&#x2F;span&gt;&lt;span&gt;ServiceTableBase;&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #6272A4;&quot;&gt;    &#x2F;&#x2F; Calculate target address (x64 offsets)&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span&gt;    LONG Offset &lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;=&lt;&#x2F;span&gt;&lt;span&gt; (LONG)((ULONG_PTR)HookFunction &lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;-&lt;&#x2F;span&gt;&lt;span&gt; (ULONG_PTR)ServiceTableBase);&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #6272A4;&quot;&gt;    &#x2F;&#x2F; Disable Write Protection (CR0) - *DANGEROUS*&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #50FA7B;&quot;&gt;    DisableWP&lt;&#x2F;span&gt;&lt;span&gt;();&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #6272A4;&quot;&gt;    &#x2F;&#x2F; Apply Hook&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;    *&lt;&#x2F;span&gt;&lt;span&gt;OriginalFunction &lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;=&lt;&#x2F;span&gt;&lt;span&gt; (PVOID)((ULONG_PTR)ServiceTableBase &lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;+&lt;&#x2F;span&gt;&lt;span&gt; (ServiceTableBase[ServiceIndex]&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt; &amp;gt;&amp;gt;&lt;&#x2F;span&gt;&lt;span style=&quot;color: #BD93F9;&quot;&gt; 4&lt;&#x2F;span&gt;&lt;span&gt;));&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #50FA7B;&quot;&gt;    InterlockedExchange&lt;&#x2F;span&gt;&lt;span&gt;((PLONG)&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;&amp;amp;&lt;&#x2F;span&gt;&lt;span&gt;ServiceTableBase[ServiceIndex], (Offset &lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;&amp;lt;&amp;lt;&lt;&#x2F;span&gt;&lt;span style=&quot;color: #BD93F9;&quot;&gt; 4&lt;&#x2F;span&gt;&lt;span&gt;)&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt; |&lt;&#x2F;span&gt;&lt;span&gt; (ServiceTableBase[ServiceIndex]&lt;&#x2F;span&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt; &amp;amp; 0x&lt;&#x2F;span&gt;&lt;span style=&quot;color: #BD93F9;&quot;&gt;F&lt;&#x2F;span&gt;&lt;span&gt;));&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #50FA7B;&quot;&gt;    EnableWP&lt;&#x2F;span&gt;&lt;span&gt;();&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;    return&lt;&#x2F;span&gt;&lt;span&gt; STATUS_SUCCESS;&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span&gt;}&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;
&lt;p&gt;By disabling write protection in the CR0 register, the malware briefly opens a window to patch the SSDT pointer. This allows it to redirect execution flow for specific API calls, such as NtQuerySystemInformation, effectively hiding its malicious processes from standard monitoring tools like Task Manager.&lt;&#x2F;p&gt;
&lt;div class=&quot;callout-warning&quot; role=&quot;alert&quot;&gt;
  &lt;div class=&quot;callout-warning__title&quot;&gt;
    &lt;span class=&quot;material-symbols-outlined&quot; aria-hidden=&quot;true&quot;&gt;warning&lt;&#x2F;span&gt;
    WARNING
  &lt;&#x2F;div&gt;
  &lt;p class=&quot;callout-warning__text&quot;&gt;
    Executing CR0 manipulation on modern systems with Virtualization-Based Security (VBS) or Hypervisor-Enforced Code Integrity (HVCI) enabled will result in an immediate bug check (Blue Screen of Death).
  &lt;&#x2F;p&gt;
&lt;&#x2F;div&gt;</content>
        
    </entry>
    <entry xml:lang="en">
        <title>Kemeny seggbe kuras</title>
        <published>2026-05-16T00:00:00+00:00</published>
        <updated>2026-05-16T00:00:00+00:00</updated>
        
        <author>
          <name>
            
              Unknown
            
          </name>
        </author>
        
        <link rel="alternate" type="text/html" href="https://malware-lab-source.pages.dev/posts/test-cikk/"/>
        <id>https://malware-lab-source.pages.dev/posts/test-cikk/</id>
        
        <content type="html" xml:base="https://malware-lab-source.pages.dev/posts/test-cikk/">&lt;h2 id=&quot;a-fo-cimdal-a-seggembol-jon-ki-a-szellel&quot;&gt;A fo cimdal a seggembol jon ki a szellel&lt;&#x2F;h2&gt;
&lt;p&gt;Igazan kemeny a gatyamba a fos&lt;&#x2F;p&gt;
&lt;pre class=&quot;giallo&quot; style=&quot;color: #F8F8F2; background-color: #282A36;&quot;&gt;&lt;code data-lang=&quot;c&quot;&gt;&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;  #include&lt;&#x2F;span&gt;&lt;span style=&quot;color: #E9F284;&quot;&gt; &amp;lt;&lt;&#x2F;span&gt;&lt;span style=&quot;color: #F1FA8C;&quot;&gt;stdio.h&lt;&#x2F;span&gt;&lt;span style=&quot;color: #E9F284;&quot;&gt;&amp;gt;&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;  int&lt;&#x2F;span&gt;&lt;span style=&quot;color: #50FA7B;&quot;&gt; main&lt;&#x2F;span&gt;&lt;span&gt;()&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span&gt;  {&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #50FA7B;&quot;&gt;    printf&lt;&#x2F;span&gt;&lt;span&gt;(&lt;&#x2F;span&gt;&lt;span style=&quot;color: #E9F284;&quot;&gt;&amp;quot;&lt;&#x2F;span&gt;&lt;span style=&quot;color: #F1FA8C;&quot;&gt;Könyörgöm Pali, tekerj egyet a fitymádon, ha pisálnod kell!&lt;&#x2F;span&gt;&lt;span style=&quot;color: #E9F284;&quot;&gt;&amp;quot;&lt;&#x2F;span&gt;&lt;span&gt;);&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span style=&quot;color: #FF79C6;&quot;&gt;    return&lt;&#x2F;span&gt;&lt;span style=&quot;color: #BD93F9;&quot;&gt; 0&lt;&#x2F;span&gt;&lt;span&gt;;&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;
&lt;span class=&quot;giallo-l&quot;&gt;&lt;span&gt;  }&lt;&#x2F;span&gt;&lt;&#x2F;span&gt;&lt;&#x2F;code&gt;&lt;&#x2F;pre&gt;&lt;div class=&quot;callout-warning&quot; role=&quot;alert&quot;&gt;
  &lt;div class=&quot;callout-warning__title&quot;&gt;
    &lt;span class=&quot;material-symbols-outlined&quot; aria-hidden=&quot;true&quot;&gt;warning&lt;&#x2F;span&gt;
    WARNING
  &lt;&#x2F;div&gt;
  &lt;p class=&quot;callout-warning__text&quot;&gt;
    Ha kosz van a töködön, és olyan mint az avas joghurt megjelennek a fitymanók.
  &lt;&#x2F;p&gt;
&lt;&#x2F;div&gt;</content>
        
    </entry>
</feed>
