c:\users\icyheart\docume~1\visual~1\projects\download\driver\objchk_wxp_x86\i386\Driver.pdb
Static task
static1
General
-
Target
291536981ff877747e70f7f6311e366a_JaffaCakes118
-
Size
12KB
-
MD5
291536981ff877747e70f7f6311e366a
-
SHA1
3b14b50fc892e619b2c9fef278023259c5b2245b
-
SHA256
40b0500cd3861990d38c2689331bf0a9d7426128c3ee86b2dccbb1e6165f647d
-
SHA512
b74a4937b8f03d986abba5193425f85ccc3b29eb80ed5e8a66ce281c801ea2d6c591ca98e1ef5a51fbc0b1105d24f26e36711d55f2f310e155c173db8ebe578f
-
SSDEEP
192:r7hE753Wi0Je88uc/buwVKowZnKtUOIbWP1+eMT4iH1sRVOD2niTLW7Ks:HCpBuc/buwVKoUnKF05X0i3W7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 291536981ff877747e70f7f6311e366a_JaffaCakes118
Files
-
291536981ff877747e70f7f6311e366a_JaffaCakes118.sys windows:6 windows x86 arch:x86
48a6d5568b5fcf2db308c5f2394ca547
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlFreeAnsiString
ObfDereferenceObject
KeServiceDescriptorTable
ExFreePoolWithTag
IofCompleteRequest
ProbeForWrite
ProbeForRead
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 264B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 442B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 256B - Virtual size: 170B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ