c:\rs\Driver\i386\1111.pdb
Static task
static1
General
-
Target
24e74b213f09bcf35302283084231fb3_JaffaCakes118
-
Size
16KB
-
MD5
24e74b213f09bcf35302283084231fb3
-
SHA1
1fdbfc0511db03e09ceeb8070b0f6d16ca717eb3
-
SHA256
e0f3142a124ce180c7bff61bbac0b1859e86686bb33de7d6339aad107bc6ced8
-
SHA512
d0a0f708575003c92258f6fa28342174fe333566d0b133fbf50a13bd1dff4498ff5df742de39897843ddd46711ed3da4531a42e5564a376e8d8c5dc84c883adf
-
SSDEEP
96:qcu0m/wxbj/sSvUb/qCFr/eefBJ9/V4PNF/GmiHp/zw4/WlCTBuuUV36YrpHliKK:qcuPSvuBwyTQuuNW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24e74b213f09bcf35302283084231fb3_JaffaCakes118
Files
-
24e74b213f09bcf35302283084231fb3_JaffaCakes118.sys windows:5 windows x86 arch:x86
1761193bc833889c1f05a532d0c5f343
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
_strnicmp
MmIsAddressValid
IofCompleteRequest
DbgPrint
ZwClose
ObReferenceObjectByHandle
ZwOpenProcess
wcslen
ExFreePoolWithTag
ZwQuerySystemInformation
ExAllocatePoolWithTag
KeDetachProcess
ZwQueryInformationProcess
KeAttachProcess
MmGetSystemRoutineAddress
wcscpy
IoDeleteDevice
ProbeForWrite
ProbeForRead
_except_handler3
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 676B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ