d:\works\kernelbots_up8\driver\bypass\bypass\i386\bypass.pdb
Static task
static1
General
-
Target
28df11bbfc15baed1e74e32dc1eeb160_JaffaCakes118
-
Size
61KB
-
MD5
28df11bbfc15baed1e74e32dc1eeb160
-
SHA1
35b8f3b60f42f161ca8385c5b8ee48cd2e3b7cee
-
SHA256
afe32c8c8aea69fb33f3766783b14abde0b13d12826e37c3686564ae2ed3cc87
-
SHA512
9c10ceba25604b2ec96d1396eab9f5d17fbe71c1ecfb4d20dd64ef63a21fa92ddb1d96256e117813f1f0f5e5e631a2f493fb9377a0d799286c3bced93c23a914
-
SSDEEP
384:d43K6ooKM/qD6Goz5KrQxmHs6C7wEAq4CwD8G1m/XTQAUg4oL6LAd6XxBSteKe/q:moI/ctol16ZDQWSSYDZNo+t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28df11bbfc15baed1e74e32dc1eeb160_JaffaCakes118
Files
-
28df11bbfc15baed1e74e32dc1eeb160_JaffaCakes118.sys windows:5 windows x86 arch:x86
bee406c6007a6c72724d75a698d3ab97
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ExFreePoolWithTag
_stricmp
strrchr
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwClose
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
IoCreateFile
RtlInitUnicodeString
KeServiceDescriptorTable
ZwOpenProcess
wcslen
RtlGetVersion
MmUserProbeAddress
NtBuildNumber
KeBugCheck
KeTickCount
KeBugCheckEx
ObReferenceObjectByHandle
MmIsAddressValid
hal
KeGetCurrentIrql
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 706B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ