d:\rootkit\hideprocess\hideprocess\objchk_wxp_x86\i386\HideProcess.pdb
Static task
static1
General
-
Target
15207a04fdb56be3b6e12bb927bf7e56_JaffaCakes118
-
Size
5KB
-
MD5
15207a04fdb56be3b6e12bb927bf7e56
-
SHA1
baed2b85f3c573b217a9518adcf0def4d15407f7
-
SHA256
32a7a63d3e2eb4a973ed02f5e6e3838ae008f914af52f2a9106a021682c0cc1d
-
SHA512
649a3d44efafc538366d5e6bf6b108ab9195f96581d8c9d90ea864ccf5af460aa0a00459cfad0019da06f3d9a855e74e32c2afdd9d672ffcf0d57dc7e450960c
-
SSDEEP
96:8IU3uw0YWhzXJ3WTOkdka/7izpr/p+TReXRsU9EN:e3jKzXJ3WTOkdhiFr/ITMs7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15207a04fdb56be3b6e12bb927bf7e56_JaffaCakes118
Files
-
15207a04fdb56be3b6e12bb927bf7e56_JaffaCakes118.sys windows:6 windows x86 arch:x86
9b3cf04d84c299a00210ae53226d761f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IoCreateDevice
RtlInitUnicodeString
DbgPrint
IofCompleteRequest
IoDeleteSymbolicLink
memset
IoCreateSymbolicLink
ZwQuerySystemInformation
RtlAnsiStringToUnicodeString
RtlInitAnsiString
memcpy
KeTickCount
KeBugCheckEx
KeServiceDescriptorTable
IoDeleteDevice
hal
KeGetCurrentIrql
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 203B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ