D:\sys\RST\objchk\i386\ressdX.pdb
Static task
static1
General
-
Target
30ad14705aeb10ec2fa545b40e18cb1c_JaffaCakes118
-
Size
4KB
-
MD5
30ad14705aeb10ec2fa545b40e18cb1c
-
SHA1
234c65c5b49af6fcbcd08a9f473493188828ea14
-
SHA256
26e8e77dedfc594d5ec003033485ca31933846cedb19bde38303c0fd560608df
-
SHA512
7d983246f3e87729027605b2809891e4f7273c5f4e51f9f633c4aa69ccfbc647b02b5f09e33e7b911d94f1ebc49007732a2c8bf31f53799506cf88ce470f0d5b
-
SSDEEP
96:b4auSL8qMi7DyF7et11yhX+MEWKLu+Ww8:UteIe0hXoWKq+Wp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30ad14705aeb10ec2fa545b40e18cb1c_JaffaCakes118
Files
-
30ad14705aeb10ec2fa545b40e18cb1c_JaffaCakes118.sys windows:5 windows x86 arch:x86
162e100140ec6485c77446096c35e4c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
DbgPrint
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
Sections
.text Size: 896B - Virtual size: 874B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 324B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 98B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ