D:\sys\RST\objchk\i386\ressdX.pdb
Static task
static1
General
-
Target
84a4159c638d71228e41091c8ee23690_JaffaCakes118
-
Size
4KB
-
MD5
84a4159c638d71228e41091c8ee23690
-
SHA1
326cb22becfb6417742a044eec84c21a6cc32780
-
SHA256
c6d3a0a79080e9118ac8e03034ac60732ee375eb55afcfc78235bb33ba2e65ed
-
SHA512
98479be197742daabc1702fec62786d912c31275ae14ce81b0c5219f8e0df532bd8cf68a59e67aa37c68c50382ac3943d2fe3ec04af31e2fcf949fd1c8104259
-
SSDEEP
48:ilGSk+ELel589nSMOhRE0bU57sj3ABqod9IXVcNLRr12Zo+sjIZWQ7q2ue5WwGD+:1rnSthWM077BqoHLt11t+MEWKLu+Ww8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84a4159c638d71228e41091c8ee23690_JaffaCakes118
Files
-
84a4159c638d71228e41091c8ee23690_JaffaCakes118.sys windows:5 windows x86 arch:x86
162e100140ec6485c77446096c35e4c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
DbgPrint
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
Sections
.text Size: 1024B - Virtual size: 910B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 324B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ