D:\maofang\benz\SYS\objfre\i386\KILLKB.pdb
Static task
static1
General
-
Target
03195376b8e48d101f13f0f848ee5fbf_JaffaCakes118
-
Size
4KB
-
MD5
03195376b8e48d101f13f0f848ee5fbf
-
SHA1
20d7001fe1dae531b172bd5d66a855b13c204b6c
-
SHA256
ad778427036d5664e5c96500baf1b1a9187f4f5294a8c79d948af2dbdeeaa1d6
-
SHA512
285ae11d1f5a409d726e49df767f7073426b907108bae1163e758c9aa0a805594dde19b9b62a15c30e882d86521d4bec89f89c77751dbfa40e476bf60f4724d6
-
SSDEEP
48:iZnhjI5GJ/oFa2E8B8cn/pLd1LBOKpNj1lqVlVUA66bVVtRrgnsz:C+5GJwFa2bpn/pLXAKLpDAL1gn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03195376b8e48d101f13f0f848ee5fbf_JaffaCakes118
Files
-
03195376b8e48d101f13f0f848ee5fbf_JaffaCakes118.sys windows:5 windows x86 arch:x86
5a1e0db0831434fc9b91bbb5a3583c3f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
ZwOpenProcess
PsProcessType
ZwClose
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwCreateJobObject
KeServiceDescriptorTable
IoCreateSymbolicLink
IoCreateDevice
_except_handler3
_stricmp
ObReferenceObjectByHandle
hal
KfLowerIrql
KeRaiseIrqlToDpcLevel
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 207B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 534B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ