d:\capturedriver\objfre_wnet_x86\i386\bkdp1.pdb
Static task
static1
General
-
Target
23a4a605182f98326f4b281edcb358b1_JaffaCakes118
-
Size
247KB
-
MD5
23a4a605182f98326f4b281edcb358b1
-
SHA1
cf88a3cd1efb536b1050a9a1cda8f1d10b982b21
-
SHA256
2c1ca413665cb278f90824c392fcc51d4ebb84c43671aa9e23da548a4bfc49d6
-
SHA512
3f7aed6d64f278f5e3270d2990a5f9db5660216c6d20741884b4c00a500ac267c33c38c1d49a1fba3c109b9c9fed48d09b4d41e7ae18cff27e37f3fba1bf8820
-
SSDEEP
3072:fQ2uhD0HsTTLDNR7lGVHM5/RJULHqoG17a2IDzmPiqfYJ64xs:fQ2unR7lGVHM5/RJULHxG17JIDzmKqfl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23a4a605182f98326f4b281edcb358b1_JaffaCakes118
Files
-
23a4a605182f98326f4b281edcb358b1_JaffaCakes118.sys windows:5 windows x86 arch:x86
fc64e59c254ad4fce78d607374647974
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoCreateSymbolicLink
IoCreateDevice
KeServiceDescriptorTable
MmIsAddressValid
KeAddSystemServiceTable
_except_handler3
PsGetCurrentProcessId
KeDetachProcess
KeAttachProcess
PsLookupProcessByProcessId
KeTickCount
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ