C:\ghost-src(9-2114)\ghost-src(9-24)\Server\sys\i386\treachery.pdb
Static task
static1
General
-
Target
669ff09c43693889b729059584f05c17_JaffaCakes118
-
Size
2KB
-
MD5
669ff09c43693889b729059584f05c17
-
SHA1
3e2f4f61c2a94220839d7e9da0ea62be9d076c8d
-
SHA256
964bf348d4c515bd02e1d22b6b07a308fe94a9d26a926494f6efc32b89ba14bc
-
SHA512
2aecee31557bc624066314f59d7bf37b889174a7e9d67d462bba633b0cbf8132455bfed43414ad1812510129ce5033663724b6758a7b788ac001ebb90aafa27d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 669ff09c43693889b729059584f05c17_JaffaCakes118
Files
-
669ff09c43693889b729059584f05c17_JaffaCakes118.sys windows:5 windows x86 arch:x86
b5bbd0b395355558635a7d448bf47c91
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
KeServiceDescriptorTable
ProbeForRead
_except_handler3
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 896B - Virtual size: 790B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 183B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 288B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ