D:\killhy\精简2\killkb\1\objfre\i386\killkb.pdb
Static task
static1
General
-
Target
1925a5515409e929d167e0d799cf4a2e_JaffaCakes118
-
Size
8KB
-
MD5
1925a5515409e929d167e0d799cf4a2e
-
SHA1
38e361c9738edaa52f48375d73397bd560ea5873
-
SHA256
cea246e7ecf5c7910637b950bcfca6308a333207d9f8395567e8529a403b1478
-
SHA512
8ba854399081121a64e9e0982816d9385c6025dcdd8722d77cfdeed8da1cb4bb43279931d21506327594b6f6efa4eb4ae92e5757a04e4c52390f1e4d2f30fe0c
-
SSDEEP
96:xyj29pvTqMfOxjJ1gfBI/4ak9Cg3Yhfb+a7GOLdaBkMBwQCbvI6F75vC2SwJq:x2GvTdK/41gqYhfX02MihE6FVvCdwJq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1925a5515409e929d167e0d799cf4a2e_JaffaCakes118
Files
-
1925a5515409e929d167e0d799cf4a2e_JaffaCakes118.sys windows:5 windows x86 arch:x86
2b1180ca148c92a6a38a5eb5a8c9cb0c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IofCompleteRequest
ExFreePoolWithTag
_stricmp
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwClose
ObOpenObjectByPointer
KeDetachProcess
ZwTerminateProcess
KeAttachProcess
MmUnmapViewOfSection
PsLookupProcessByProcessId
IoCreateSymbolicLink
IoCreateDevice
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 510B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 134B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ