D:\Homework\job20090122\Wis080927\objchk\i386\ecpide.pdb
Static task
static1
General
-
Target
3e7b6f0f2b63763a8fe3102c22366154_JaffaCakes118
-
Size
152KB
-
MD5
3e7b6f0f2b63763a8fe3102c22366154
-
SHA1
2d9e37f50baa3a0ebb7e4b8dc1d622e8b6e380a7
-
SHA256
51ff17a06ffb8e34c36bcf9c0a7f880a0714d62e185230b824c40f6703a7beff
-
SHA512
95e7b8f20e708aedfb52b4320d2d6e8b829394597065cec3811d02063027bf51e90a1e6296ba8cf778b9a1d9004fc697ac05b5f44cbbdea3499c6877363155d8
-
SSDEEP
3072:FsppoVZX/9zRmiV/EkDjyLS73YNiyTld+8eF2HjTzgwf:FspI19/VMLLWYdTG8mgj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e7b6f0f2b63763a8fe3102c22366154_JaffaCakes118
Files
-
3e7b6f0f2b63763a8fe3102c22366154_JaffaCakes118.sys windows:5 windows x86 arch:x86
72482443bf6bfa1a1683e54ef4b131d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
_stricmp
IoGetCurrentProcess
ZwClose
ZwWriteFile
ZwCreateFile
RtlInitUnicodeString
wcscat
wcscpy
IoDeleteDevice
MmGetSystemRoutineAddress
ExFreePoolWithTag
ZwReadFile
ExAllocatePoolWithTag
ZwQueryInformationFile
ZwOpenFile
ZwQueryValueKey
ZwOpenKey
PsCreateSystemThread
PsGetVersion
strncmp
ZwMapViewOfSection
ZwCreateSection
ZwUnmapViewOfSection
IoDeleteSymbolicLink
PsSetCreateProcessNotifyRoutine
IofCompleteRequest
KeWaitForSingleObject
MmUnlockPages
KeInsertQueueApc
KeInitializeApc
KeInitializeEvent
KeUnstackDetachProcess
MmMapLockedPagesSpecifyCache
KeStackAttachProcess
IoFreeMdl
MmProbeAndLockPages
IoAllocateMdl
_except_handler3
KeSetEvent
ZwAllocateVirtualMemory
KeClearEvent
IoCreateNotificationEvent
ObfDereferenceObject
PsLookupProcessByProcessId
IoCreateDevice
Exports
Exports
?JitKetPrleTheSystem1@@YGHXZ
?JitKetPrleTheSystem2@@YGHXZ
?JitKetPrleTheSystem3@@YGHXZ
?JitKetPrleTheSystem4@@YGHXZ
?JitKetPrleTheSystem5@@YGHXZ
?JitKetPrleTheSystem6@@YGHXZ
?JitKetPrleTheSystem7@@YGHXZ
?JitKetPrleTheSystem@@YGHXZ
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 477B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 384B - Virtual size: 362B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 596B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ