C:\x2\objchk\i386\removegb.pdb
Static task
static1
General
-
Target
2e66f1185ba2425db59dc285f3781cd4_JaffaCakes118
-
Size
4KB
-
MD5
2e66f1185ba2425db59dc285f3781cd4
-
SHA1
94e001dc4937725b4c4e34ce54f33551429034a8
-
SHA256
f525085c20d95d0949057368f4172efdcc982ef887f171c2a4bdfd87b6f91a2c
-
SHA512
f62c4ef3da75227d54c4a6e16fa2be68080344c8c1121b47d44fc1a859887d8d27cfe7e5d735642593730e4bb5a7ccca7290a78ac65e7847026808cc2e79815b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e66f1185ba2425db59dc285f3781cd4_JaffaCakes118
Files
-
2e66f1185ba2425db59dc285f3781cd4_JaffaCakes118.sys windows:5 windows x86 arch:x86
4edfd276e71f47012f7caa2851028913
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
ZwDeleteFile
RtlInitUnicodeString
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 99B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 256B - Virtual size: 132B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ