A forum for reverse engineering, OS internals and malware analysis 

All off-topic discussion goes here.
 #24246  by Ta!0n
 Tue Oct 28, 2014 5:37 pm
Hey Guys,

just finish reading the Kaspersky Hooking Engine Analysis documentation: https://quequero.org/2014/10/kaspersky- ... -analysis/
i have quick Question, the Article refers to SSDT hooking in Windows 32bit. how can they achieve the SSDT hooking on X86_64 ? Patch Guard will prevent any SSDT modification even if your driver is signed, is this correct ?
if so, how the AV engines achieve the same operation ?

Cheers,

ta10n
 #24250  by R136a1
 Tue Oct 28, 2014 7:50 pm
SSDT hooking is not performed on 64-bits systems because the Kernel Patch Protection (KPP), also known as Patchguard, protects this structure.
It is anyway possible to use a mini-filter driver as a workaround.
 #24253  by t4L
 Wed Oct 29, 2014 2:39 am
It is anyway possible to use a mini-filter driver as a workaround.
I find this quite funny, as in fact it is totally reversed the other way. You MUST use minifilter while hooking SSDT is just a workaround.
 #24344  by Microwave89
 Fri Nov 14, 2014 12:56 am
You can also have a device object if you previously created a fake driver object. So there might be no (valid) .sys file associated with a particular device.

Best Regards

Microwave89