D:\maofang\benz\SYS\objfre\i386\KILLKB.pdb
Static task
static1
General
-
Target
6020d0566d4751f965aa5ce3163679c6_JaffaCakes118
-
Size
5KB
-
MD5
6020d0566d4751f965aa5ce3163679c6
-
SHA1
fc01d1dfa32fda38c598dfcef0a40c7f8d3ea0b2
-
SHA256
9d17b3865d5352e006eeda49bea87f65bc51c52392f5c225bbd7d0472c0141fd
-
SHA512
7dc8ae95fe1babf2dccb9bad6482b4e28d513b5a7e9a9c1cc289bbbc48839780c62446c9e8e4894491c8bbafbf0a93ec8e319cb1d0257d910383e8032afc8c8a
-
SSDEEP
48:iZ0mfhx/587nWB3VTEX8U580nidBI1pDqVlVUA66bVVtRrgfa+:ex/587EVTEX559nidoLAL1gfp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6020d0566d4751f965aa5ce3163679c6_JaffaCakes118
Files
-
6020d0566d4751f965aa5ce3163679c6_JaffaCakes118.sys windows:5 windows x86 arch:x86
5a1e0db0831434fc9b91bbb5a3583c3f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
ZwOpenProcess
PsProcessType
ZwClose
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwCreateJobObject
KeServiceDescriptorTable
IoCreateSymbolicLink
IoCreateDevice
_except_handler3
_stricmp
ObReferenceObjectByHandle
hal
KfLowerIrql
KeRaiseIrqlToDpcLevel
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 207B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 534B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ