c:\users\icyheart\docume~1\visual~2\projects\download\driver\objfre_wxp_x86\i386\Driver.pdb
Static task
static1
General
-
Target
3de888254f1a2069a35d2b6ef93b8073_JaffaCakes118
-
Size
4KB
-
MD5
3de888254f1a2069a35d2b6ef93b8073
-
SHA1
9d045b0eae9ec32b9aa87e61390d953b66c10689
-
SHA256
c7489a83642a7fce2ac22341e17080b9f3417829da3477971ca92007bab42e61
-
SHA512
e34063442b9bf098a0e92d8e9528aa73ea4a1d9438ddae080851426e53c8873f0079003f129dcd9eefba9917c30efb41db77a0b5dd7a83a4a6596c543c681be9
-
SSDEEP
48:QU/IgG2pRKfSsLieoZHD6j0REu9yPITg9aRAXIwA2EO0A+KEOU2:G2pRKfhoJUPOWTKR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3de888254f1a2069a35d2b6ef93b8073_JaffaCakes118
Files
-
3de888254f1a2069a35d2b6ef93b8073_JaffaCakes118.sys windows:6 windows x86 arch:x86
170d9dcb60a950724b6537c71c70081a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
ExFreePoolWithTag
ZwClose
ObOpenObjectByPointer
KeDetachProcess
ZwTerminateProcess
KeAttachProcess
MmUnmapViewOfSection
_stricmp
ExAllocatePoolWithTag
ZwQuerySystemInformation
PsLookupProcessByProcessId
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
Sections
.text Size: 896B - Virtual size: 780B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 544B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 128B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ