D:\开发代码\临时版本\免费20071125\PcHide\objfre\i386\vbnxqwwer.pdb
Static task
static1
General
-
Target
0ea9f3947edd2e6c517e8f2e2eb5df4c_JaffaCakes118
-
Size
5KB
-
MD5
0ea9f3947edd2e6c517e8f2e2eb5df4c
-
SHA1
4d6195bd57b7bde35e93f204567c34fa26521682
-
SHA256
fb0fe4ba96731c8f3078259473aa313f19c4010a4f4640fde37cbd43d39be945
-
SHA512
5efebcddb73102a2cca7a5b8bdde1e6515b92297360b9f09b224212bcf1b7c721e5a94e639df2d8d37e32cb6a8925b569efe73590e788e350941ff2c1344a125
-
SSDEEP
96:ZkPqEqivH7e/y1i4VtyLQxUMlQ6soo112Q3:ZkPqEn7eK1HyLQx66soVQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ea9f3947edd2e6c517e8f2e2eb5df4c_JaffaCakes118
Files
-
0ea9f3947edd2e6c517e8f2e2eb5df4c_JaffaCakes118.sys windows:5 windows x86 arch:x86
b785776503e81ba9e5ef68ab044dc45c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
nt
RtlFreeAnsiString
RtlCompareMemory
RtlUpperString
RtlUnicodeStringToAnsiString
RtlInitUnicodeString
PsGetCurrentProcessId
ZwQueryDirectoryFile
ZwDeviceIoControlFile
IoDeleteDevice
IoDeleteSymbolicLink
wcscat
RtlFreeUnicodeString
wcscpy
RtlAnsiStringToUnicodeString
IofCompleteRequest
KeServiceDescriptorTable
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 640B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 526B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 256B - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ