J:\gbzinho\objchk\i386\Win.pdb
Static task
static1
General
-
Target
086c5d762c1e214b63ccbc3c8422597c_JaffaCakes118
-
Size
3KB
-
MD5
086c5d762c1e214b63ccbc3c8422597c
-
SHA1
0f84c91bdf1673af6cf7d5a60d952ab805061528
-
SHA256
bdcf2543bc408f7d69553ed15078e6bea109e85d80355f2c305371d849c9658f
-
SHA512
dbebeddaf29db4e4271b896d1e2f379806f1ac005ad1b3c754ac42103aaf70898c2598582caad00f726dfd18bc6127a22fa2cd8f95ecf23df3e6a83d7501e34a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 086c5d762c1e214b63ccbc3c8422597c_JaffaCakes118
Files
-
086c5d762c1e214b63ccbc3c8422597c_JaffaCakes118.sys windows:5 windows x86 arch:x86
4edfd276e71f47012f7caa2851028913
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
ZwDeleteFile
RtlInitUnicodeString
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 99B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 256B - Virtual size: 132B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ