e:\0soft_v03\loader\rootkit\v1.0\driver\objfre_wxp_x86\i386\drive4.pdb
Static task
static1
General
-
Target
7814b6e4585452f110384fa24bec5491_JaffaCakes118
-
Size
29KB
-
MD5
7814b6e4585452f110384fa24bec5491
-
SHA1
938f01266fe7bb48990b9c04fe19639e699a87a2
-
SHA256
70067a7c3625095910d1a1f28835df777223dc86ef7b460f3cd9fc67888462d0
-
SHA512
dbb48a2600c8241ab1586e4b23dd2cc97f076828a08507029169ab1ab05a08df2111391a1d3a615b9ab510f6d445c9c56503775bf46ac8b3065cc72019c4c64f
-
SSDEEP
384:iD5Yhu6A86nROIz7s3hoCdBgK1P2mRELTlJVY5gsHPOvIkEM3CkpcXmp3T:iDT6X6ROA7sRpP1mhg55mwjXmBT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7814b6e4585452f110384fa24bec5491_JaffaCakes118
Files
-
7814b6e4585452f110384fa24bec5491_JaffaCakes118.sys windows:6 windows x86 arch:x86
ec20f270a090e100eaf3eec2b63a17ee
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IoDeleteDevice
IoDeleteSymbolicLink
NtBuildNumber
PsLookupProcessByProcessId
PsTerminateSystemThread
KeCancelTimer
KeWaitForSingleObject
KeSetTimerEx
KeInitializeTimerEx
IofCompleteRequest
ZwOpenFile
ExFreePoolWithTag
RtlInitUnicodeString
ExAllocatePool
memcpy
memset
wcsncpy
ZwWriteFile
ZwCreateFile
ZwDeleteFile
DbgPrint
_except_handler3
PsCreateSystemThread
IoCreateSymbolicLink
IoCreateDevice
ZwQuerySystemInformation
ObReferenceObjectByHandle
ZwOpenThread
ObfReferenceObject
ObfDereferenceObject
KeUnstackDetachProcess
MmUnmapLockedPages
IoFreeMdl
KeInsertQueueApc
KeInitializeApc
MmMapLockedPagesSpecifyCache
MmProbeAndLockPages
IoAllocateMdl
wcsncmp
ObOpenObjectByName
wcsstr
KeStackAttachProcess
ZwClose
hal
KfLowerIrql
KfRaiseIrql
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 460B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ