d:\works\kernelbots_up6\driver\bypass\bypass\i386\bypass.pdb
Static task
static1
General
-
Target
f1f249b59cf95d244cf0175e39f4e3be_JaffaCakes118
-
Size
65KB
-
MD5
f1f249b59cf95d244cf0175e39f4e3be
-
SHA1
144f7844a20961cd5316cf7936336e8b3824c57e
-
SHA256
c049bb0f85c4123615d0082cab00be4bf10fd7f5a629db8ffca4a742a3b47c6e
-
SHA512
6bab8d6addb5d6d37faf806d98e81cd7676d8986c653303a1194feeb88777fb4452a294bc811b80f0f7e9d5ce053b8163e94e3d872bd0aee17452dce4d9aed20
-
SSDEEP
384:d7K6r6lyIAqD6Goa5KrQxmHs6C7wEAq4CwD8G1m/XTQAUg4oL6LAd6XxBSteKe/l:drKActoq16ZDGk4zuuZSSYDZNo+tL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f1f249b59cf95d244cf0175e39f4e3be_JaffaCakes118
Files
-
f1f249b59cf95d244cf0175e39f4e3be_JaffaCakes118.sys windows:5 windows x86 arch:x86
36f4b13729ddb073344d5ee70daf4538
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ExFreePoolWithTag
_stricmp
strrchr
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwClose
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
IoCreateFile
RtlInitUnicodeString
KeServiceDescriptorTable
ZwOpenProcess
wcslen
strncmp
IoGetCurrentProcess
RtlGetVersion
MmUserProbeAddress
NtBuildNumber
KeBugCheck
KeTickCount
KeBugCheckEx
ObReferenceObjectByHandle
MmIsAddressValid
hal
KeGetCurrentIrql
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 746B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ