E:\caryzou_TBHProj_int\SO_PSD_VOB\TBH\SOURCECODE\MainDrv\objfre_wnet_x86\i386\ADProt.pdb
Static task
static1
General
-
Target
834ca5fabe3c7344c4421fed0b1486ae_JaffaCakes118
-
Size
49KB
-
MD5
834ca5fabe3c7344c4421fed0b1486ae
-
SHA1
942d1ca4deb1d7313ed5ba1c075e391956edc040
-
SHA256
d7d901348997ab1c9326481d22120f2339697066a3ff0dd53dbec95516af8060
-
SHA512
1d27ba146edad9a16ffef466b2c36fc66b66822cb2b56cb2c664edf7af5a70ca00aeadb9057aade6b884d63e3815bd4d957ff761fd08372c6284a6ad3b5c3d3e
-
SSDEEP
768:CDLxJ6/XMsdMdaac3m4B4yiL4IHVn7KoYrC0YfOA:C/e/csdMdaac3m4+HVn7Ko+Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 834ca5fabe3c7344c4421fed0b1486ae_JaffaCakes118
Files
-
834ca5fabe3c7344c4421fed0b1486ae_JaffaCakes118.sys windows:5 windows x86 arch:x86
42bbb32e6b8b4b8c18343838e1b9fd5c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
_except_handler3
ZwCreateFile
RtlAppendUnicodeToString
IofCompleteRequest
IofCallDriver
MmIsAddressValid
IoAttachDeviceToDeviceStack
ObfReferenceObject
RtlCopyUnicodeString
_wcsnicmp
RtlEqualUnicodeString
RtlAppendUnicodeStringToString
wcscpy
swprintf
strncpy
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
KeInitializeEvent
KeGetCurrentThread
IoAllocateIrp
wcslen
IoGetTopLevelIrp
sprintf
ExFreePoolWithTag
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
ExAllocatePoolWithTag
KeDelayExecutionThread
DbgPrint
_wcsicmp
IoDeleteDevice
IoCreateDevice
IoDetachDevice
ObfDereferenceObject
IoGetBaseFileSystemDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
IoDeleteSymbolicLink
ZwWriteFile
wcscat
IoRegisterShutdownNotification
IoRegisterFsRegistrationChange
IoCreateSymbolicLink
ZwReadFile
ZwOpenKey
ExfInterlockedPushEntryList
wcschr
ZwFlushKey
ZwSetValueKey
RtlRandom
wcscmp
ZwCreateKey
ZwOpenFile
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwDeleteFile
ZwSetInformationFile
PsGetVersion
_strnicmp
_stricmp
strrchr
ZwQuerySystemInformation
ZwEnumerateValueKey
ZwEnumerateKey
ZwQueryKey
ZwRestoreKey
ZwReplaceKey
ZwDeleteValueKey
ZwDeleteKey
ZwOpenSection
ZwCreateSection
KeServiceDescriptorTable
RtlFreeUnicodeString
MmUnmapLockedPages
MmMapLockedPages
MmBuildMdlForNonPagedPool
IoAllocateMdl
ZwFlushVirtualMemory
PsLookupProcessByProcessId
PsSetCreateProcessNotifyRoutine
RtlCompareString
RtlInitString
ZwMapViewOfSection
RtlCompareMemory
KeTickCount
KeBugCheckEx
RtlInitUnicodeString
ZwQueryValueKey
ZwClose
IoGetCurrentProcess
ZwQueryInformationFile
strncmp
hal
KfLowerIrql
KeGetCurrentIrql
KfAcquireSpinLock
KfReleaseSpinLock
KfRaiseIrql
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ