E:\myproject\hidefile_proccr0\Debug\hidefilecr0.pdb
Static task
static1
General
-
Target
49384750466b1aff0abf483c33ec18fd_JaffaCakes118
-
Size
5KB
-
MD5
49384750466b1aff0abf483c33ec18fd
-
SHA1
900fc3eaf51cf24ede30712bacb0d964e771a3aa
-
SHA256
eb8d9fb1a8e6bd8ea3554e7f171944fc3d78e6940c3d08572028cd387e6cdd45
-
SHA512
bdf56ababdc3bd34a91e37fc5b3037dcb346db2e251e0ab683b65d451372cb1f64912db5069ccc8ef8d0ae5bbcb04450ed40ac15e03a24972859ae66a785b160
-
SSDEEP
96:k8pg6KrNHIBWuI6Ol4VXenqs5MtvnrhKcjA:j98Iz7OlCXenwtvYV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 49384750466b1aff0abf483c33ec18fd_JaffaCakes118
Files
-
49384750466b1aff0abf483c33ec18fd_JaffaCakes118.sys windows:4 windows x86 arch:x86
cdce58d2cfa3bfbeffb9f128a15abc8e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
strncpy
RtlCompareMemory
DbgPrint
RtlFreeAnsiString
sprintf
RtlUnicodeStringToAnsiString
ZwQuerySystemInformation
KeServiceDescriptorTable
ZwQueryDirectoryFile
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 408B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 318B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 256B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ