c:\g\r\objfre_wxp_x86\i386\ster.pdb
Static task
static1
General
-
Target
279b61a35ab12950550c5fff357b64da_JaffaCakes118
-
Size
10KB
-
MD5
279b61a35ab12950550c5fff357b64da
-
SHA1
1c0b1667f3703f20af2304c795579af367159371
-
SHA256
87630ee1d68200632c5c97a992a3576789c693154537ed55bf34262c246a0c3d
-
SHA512
0f33b0ffe59c62f2ffdbf83b542c12cf001aaf4fc1fedc2fe548882a0f3b737d099b6ae0798eee14f1a080a447d8884f631f8224737ff365f7db079f530e18cd
-
SSDEEP
192:ozRGVw8Yi/f39rp1byBZ92htouguWfSd:ozRq3z1bycYJxfSd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 279b61a35ab12950550c5fff357b64da_JaffaCakes118
Files
-
279b61a35ab12950550c5fff357b64da_JaffaCakes118.sys windows:5 windows x86 arch:x86
c6f2ea99df41c0b3bb5ae5027b95cefa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
wcslen
ZwClose
ExAllocatePoolWithTag
ZwQueryValueKey
ZwOpenKey
ExFreePoolWithTag
_stricmp
IofCompleteRequest
IoFreeMdl
MmUnmapLockedPages
ObfDereferenceObject
RtlCompareMemory
IoGetDeviceObjectPointer
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
KeServiceDescriptorTable
MmGetSystemRoutineAddress
KeTickCount
KeBugCheckEx
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 596B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ