K:\work\mine_projects\r0_rootkit\r0_mich\c_src2\objfre_wnet_x86\i386\rootkit.pdb
Static task
static1
General
-
Target
94ce7b33c115bcd627f22a08c89eb6e4_JaffaCakes118
-
Size
6KB
-
MD5
94ce7b33c115bcd627f22a08c89eb6e4
-
SHA1
16ddf90d5f69dd26851ea87b0329de101c6f8c6d
-
SHA256
7474e7dde4701c7bb213957c65f4f5c0bc3ada59ee3d1fafb208caed4d72acf6
-
SHA512
e24e0aa392e75643adbd3edfb6872ff4a3a51f7573344fbb22c0c44c5d7b7564180daea6b910ebbc26d9cacccddbadfa05124df448737f4a10cd41d02613bb56
-
SSDEEP
96:LKCSNLB2hYD1h1fM4VG6B4QDAORHGFOGeFMadZe6mDd7pUHa7:LS1DD1/NVG64QDAORHGFOGeFROpr7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 94ce7b33c115bcd627f22a08c89eb6e4_JaffaCakes118
Files
-
94ce7b33c115bcd627f22a08c89eb6e4_JaffaCakes118.sys windows:5 windows x86 arch:x86
62e02954e154b1cdd4299e92844f4447
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
tolower
MmIsAddressValid
ExFreePoolWithTag
_stricmp
ExAllocatePoolWithTag
ZwQuerySystemInformation
wcstombs
KeServiceDescriptorTable
MmGetSystemRoutineAddress
RtlInitUnicodeString
strncpy
ZwCreateFile
wcsstr
wcslen
ZwQueryObject
strstr
_except_handler3
PsCreateSystemThread
KeTickCount
KeBugCheckEx
IoGetCurrentProcess
NtLockFile
strncmp
hal
KfLowerIrql
KeRaiseIrqlToDpcLevel
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 674B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 318B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ