c:\winddk\src\sys\i386\w32sec.pdb
Static task
static1
General
-
Target
2bdfe94139c2490413c20a3a5c927bc7_JaffaCakes118
-
Size
5KB
-
MD5
2bdfe94139c2490413c20a3a5c927bc7
-
SHA1
65c93659883d15feefe630cc1b2f33e9210aae0a
-
SHA256
658d3027f31bd54578352b593f70b6a87ff60c3ddfa0e6705207a3fc6ced5824
-
SHA512
396dc1b05418d2d879f9ca1ff66c85fc2f86f30bb3503c59417a38f1f34667a1fcc181d92849fc03f36929b90f372a1adc7ed74ed272bba4aa82aeac56bd38a4
-
SSDEEP
48:iqa6fA6kupHSzo2x0aM0E+VvYJm3EVEovFRs9spjhZ7:zXLxUo2x05QvYJGDEXpjz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2bdfe94139c2490413c20a3a5c927bc7_JaffaCakes118
Files
-
2bdfe94139c2490413c20a3a5c927bc7_JaffaCakes118.sys windows:6 windows x86 arch:x86
28bb4d7b892b04cd6615bfef83f225fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
KeServiceDescriptorTable
IoFreeMdl
MmUnmapLockedPages
ZwQuerySystemInformation
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
ExFreePoolWithTag
IofCompleteRequest
ExAllocatePool
memcpy
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 166B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 776B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 550B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ