d:\Backup\我的文档\Visual Studio Projects\DeviceTest3\Release\DeviceTest.pdb
Static task
static1
General
-
Target
0eeba0f5c9e86c81c657cbb5cafdc9d1_JaffaCakes118
-
Size
3KB
-
MD5
0eeba0f5c9e86c81c657cbb5cafdc9d1
-
SHA1
a0169f7549f9aef6d05577f2e5a72e5e346b0198
-
SHA256
1e4a217bddc61487a7f032ac9042cacc3a130a127d820e388dcb54e111e4c575
-
SHA512
f7ef3636db2c7f3b8508959f2c214e721676a27eb9d211d7a0152c2a5d57df4e3d1e22719201ecb2dbbee1aa37d5a33b1c5e6ff30e6862e02c48f723964ebfb6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0eeba0f5c9e86c81c657cbb5cafdc9d1_JaffaCakes118
Files
-
0eeba0f5c9e86c81c657cbb5cafdc9d1_JaffaCakes118.sys windows:4 windows x86 arch:x86
9da71f3ee033ce36abdabcf67906fa4a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IoGetDeviceObjectPointer
RtlInitUnicodeString
ObfDereferenceObject
Sections
.rdata Size: 512B - Virtual size: 193B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 512B - Virtual size: 25B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ