H:\code\new\GameHack\RegDriver\objfre\i386\Reg.pdb
Static task
static1
General
-
Target
00dbf1073ba82eed85b25e8cb7469210_JaffaCakes118
-
Size
2KB
-
MD5
00dbf1073ba82eed85b25e8cb7469210
-
SHA1
39bb6581aa7a9392e4983cbf426e81f3b88f932c
-
SHA256
7d456f798b2f57f7a94db58cd46d6a5a99bb8000d51c720a4dbb57b840e6e0b4
-
SHA512
61a9b67cc85455dc8b8b7d5369bedeed0e78d65651b0626b127fae99a3009756677036d92c6f09714e89ce99ddea3fcd3d075e7f870e518e179672fe05e20fdf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00dbf1073ba82eed85b25e8cb7469210_JaffaCakes118
Files
-
00dbf1073ba82eed85b25e8cb7469210_JaffaCakes118.sys windows:5 windows x86 arch:x86
c76aee14e828ec3979286e6ecbb1b06f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ZwClose
ZwSetValueKey
wcslen
DbgPrint
ZwOpenKey
RtlInitUnicodeString
ZwReadFile
ZwQueryInformationFile
ZwCreateFile
Sections
.text Size: 512B - Virtual size: 398B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 151B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PAGE Size: 128B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 982B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 82B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ