d:\programs\siberia2\protect\objfre_wxp_x86\i386\protect.pdb
Static task
static1
General
-
Target
60b4d3e7e9fe7eaf59b294b1c2ee0e17_JaffaCakes118
-
Size
30KB
-
MD5
60b4d3e7e9fe7eaf59b294b1c2ee0e17
-
SHA1
11d6d687a7ca1a0544212525a91d2de0c471eecb
-
SHA256
1c41e9c014c566ba4f829213fb23402c330265201c8c2dbe1573ef6233bb959b
-
SHA512
5a27ad3fcdaa0b2f211fe455cc10666fb3ad51dc35ba45726055e9e77fbe274ee15ef58e4b41c94b9522dc1a5d1fa2155187f1a5505ab4455e4ad978bc84e2ef
-
SSDEEP
384:MSFcXSOwmTyVCizMK7MEiZt8U/g9agCi1apw/vQaShOQOzXcsMyllNvr4X4Kd6R3:MnVgM3Lv0x4+/sh4zNlJ4X4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60b4d3e7e9fe7eaf59b294b1c2ee0e17_JaffaCakes118
Files
-
60b4d3e7e9fe7eaf59b294b1c2ee0e17_JaffaCakes118.sys windows:6 windows x86 arch:x86
fd056cefb51e16931d199a85a9f02eec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
memcpy
strcmp
ExFreePoolWithTag
ExAllocatePoolWithTag
ZwQuerySystemInformation
memset
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 145B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 256B - Virtual size: 184B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ