C:\Sys\exe\i386\msdirectx.pdb
Static task
static1
General
-
Target
75ccd4dda93c6324b098adc54c9aac32_JaffaCakes118
-
Size
3KB
-
MD5
75ccd4dda93c6324b098adc54c9aac32
-
SHA1
3d7b9e142d38eeb975a0518932b6fb1de3e2645e
-
SHA256
59d48b2300fdf50b2b5b1243750b0a48ad473dcdf29f32aea83656a1542e97b3
-
SHA512
fa0341393d6660cb085b5fd1f65f6dc60726fd798d1a01e4ef1e029180dd9ca674d17a887709b60ad8eae973d2e1d2fed4e15b7d486710797d2f9f3808333694
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75ccd4dda93c6324b098adc54c9aac32_JaffaCakes118
Files
-
75ccd4dda93c6324b098adc54c9aac32_JaffaCakes118.sys windows:5 windows x86 arch:x86
18f791ce2b821e756ee20b5ddfea7e8f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
strncmp
RtlFreeAnsiString
RtlCompareMemory
RtlUpperString
RtlUnicodeStringToAnsiString
RtlInitUnicodeString
RtlInitAnsiString
IoDeleteDevice
IoDeleteSymbolicLink
IoGetCurrentProcess
IofCompleteRequest
IoCreateSymbolicLink
ZwQueryDirectoryFile
KeServiceDescriptorTable
IoCreateDevice
KeTickCount
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 234B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 516B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 162B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ