g:\pack\src\vc\kernel\xhide\objfre_wxp_x86\i386\Xhide.pdb
Static task
static1
General
-
Target
5dbbbd14b545c236eb3f7c620ff66567_JaffaCakes118
-
Size
9KB
-
MD5
5dbbbd14b545c236eb3f7c620ff66567
-
SHA1
e2f594df86d9b8380a2516a009abb492b5da77d3
-
SHA256
7340482c88590b8732e320d4a69b563c1cfa50be39f8a0083326d095d07627e5
-
SHA512
98cc06e3fc7d6927f817a74d90dc6cb4e79c51d932bc1d74a62b0a1f3b64fa3e1a7e9fa5340c8cdb2284eda738038b13e0cf956398bf97ba0a38342e105aed0b
-
SSDEEP
96:oMZ88+kLSQ/Tg+NAWQjJftG7Y/zU+7VAVAZvcDX1NvwJAqWkl04C:oMZRD24TB+WCVG0/1OVA9uX1+fN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5dbbbd14b545c236eb3f7c620ff66567_JaffaCakes118
Files
-
5dbbbd14b545c236eb3f7c620ff66567_JaffaCakes118.sys windows:6 windows x86 arch:x86
62d83d758faa99b55b8a92030509b0cb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
ExFreePoolWithTag
KeServiceDescriptorTable
ZwWriteFile
ZwClose
ZwQueryValueKey
ExAllocatePoolWithTag
ZwOpenKey
RtlInitUnicodeString
memcpy
strncpy
DbgPrint
memset
strstr
strchr
strncmp
ZwReadFile
ZwQueryInformationFile
ZwOpenFile
IoGetCurrentProcess
ObfDereferenceObject
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
RtlVolumeDeviceToDosName
ObReferenceObjectByHandle
_stricmp
_strnicmp
IoDeleteDevice
IoDeleteSymbolicLink
wcsncpy
wcsrchr
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
RtlUnwind
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 892B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 474B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ