z:\work\下载者(2008.12.28)\sys\Driver\i386\fucker.pdb
Static task
static1
General
-
Target
839178ee6c4038c22ad30a7a133cef8e_JaffaCakes118
-
Size
12KB
-
MD5
839178ee6c4038c22ad30a7a133cef8e
-
SHA1
1d6ef3b66734b1ca90c29efd25bb38007d31e382
-
SHA256
384b45805d93f3e01b659dffe027f3fbfbe33fb3177116dd7c511bcb5f189c69
-
SHA512
192d49126e52ded7eeed6cb24679b2b1cbb12e097026d78ebdff09d4e8d955079c3b066fa93a963355814332a4115f628a6de59e499d6d85c43dcfb533216a49
-
SSDEEP
96:WCbqMJoVcnqepoNEQuOqTP9elDQhuHqa4JBuAzHLRVyMaE1Q1Ms7UO12s3HiJYlS:EyomnKw9eVUT8uWOOL3cmeA3MkKH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 839178ee6c4038c22ad30a7a133cef8e_JaffaCakes118
Files
-
839178ee6c4038c22ad30a7a133cef8e_JaffaCakes118.sys windows:5 windows x86 arch:x86
353bc706398fde4d8f1bc9c8b66c7ba1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IoFreeMdl
MmUnlockPages
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
_stricmp
strrchr
ExFreePoolWithTag
ExAllocatePoolWithTag
ZwQuerySystemInformation
ObfDereferenceObject
IoDriverObjectType
MmGetSystemRoutineAddress
ZwOpenProcess
ZwClose
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwCreateJobObject
IoCreateFile
KeSetEvent
ZwQueryInformationFile
KeWaitForSingleObject
KeGetCurrentThread
MmProbeAndLockPages
IoAllocateMdl
IoAllocateIrp
KeInitializeEvent
IofCompleteRequest
ObReferenceObjectByHandle
IoFileObjectType
_allmul
KeServiceDescriptorTable
ZwOpenFile
RtlAppendUnicodeToString
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
ZwReadFile
IoFreeIrp
hal
KeStallExecutionProcessor
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 845B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 628B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 494B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ