c:\king\sys\objfre_w2K_x86\i386\hook.pdb
Static task
static1
General
-
Target
768e003e58973b0c18859b6222e14bdf_JaffaCakes118
-
Size
2KB
-
MD5
768e003e58973b0c18859b6222e14bdf
-
SHA1
249181ab7b85f4c94213152b34036109c9e85699
-
SHA256
3b80901eaf2fa0b897c62bda6debbd53f54cb8d52fbc692566b58f47ac9db64b
-
SHA512
199bbb9d98af0801a355589bfa5a7ab0f059e13e7c557e5130b16afa5b38e975e36bbf613129a9453013e8adf6d1e0b75bcd0f7fe4718b72bccb10206db12989
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 768e003e58973b0c18859b6222e14bdf_JaffaCakes118
Files
-
768e003e58973b0c18859b6222e14bdf_JaffaCakes118.sys windows:5 windows x86 arch:x86
75e69d852cfc1a16298ad021c979693b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
ObfDereferenceObject
IoGetBaseFileSystemDeviceObject
IoGetDeviceObjectPointer
RtlInitUnicodeString
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
Sections
.text Size: 640B - Virtual size: 524B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 141B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 384B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 90B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ