C:\Udp\i386\udp.pdb
Static task
static1
General
-
Target
19c39150b462b8649b78e362e2418adb_JaffaCakes118
-
Size
5KB
-
MD5
19c39150b462b8649b78e362e2418adb
-
SHA1
51c0db07363863b11a574e3fc7ae64e7489f8603
-
SHA256
c661e00d21af90686eb4669958cd879a9248d7000cb25b141c22a51b56ef3e91
-
SHA512
0bc23fec3a48593b48c03ad55fd37cedd72cbe93dde5539b06988b1ff01d86cf2956af575593ae6d7a04bf447627786f159c62dbc5ef0f4fad046ffb0b9fd88c
-
SSDEEP
48:qLvsdHj8g8vpkoO1KDytlp09M427Ivh0f:2Sj8g8vfSS+v0+t7Iv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19c39150b462b8649b78e362e2418adb_JaffaCakes118
Files
-
19c39150b462b8649b78e362e2418adb_JaffaCakes118.sys windows:5 windows x86 arch:x86
8719e9e8bc102671e4ee12cdb179bb12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ObfDereferenceObject
ExAllocatePoolWithTag
IoGetDeviceObjectPointer
RtlInitUnicodeString
KeTickCount
KeBugCheckEx
ExFreePoolWithTag
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 104B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 268B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ