F:\UnhookDriver\i386\Driver.pdb
Static task
static1
General
-
Target
a5ca5b7dd7eef8e0c6c78dadb96981c0_JaffaCakes118
-
Size
5KB
-
MD5
a5ca5b7dd7eef8e0c6c78dadb96981c0
-
SHA1
26d20342a36bf0a93355d2062cebcc1fe77c3397
-
SHA256
a21aa6c7e8187e45d1f8c0f790dc60386e24e87ecde82d87c53daeef9e26f853
-
SHA512
547caf4a2e977057af558e7a996219642e9afb050ecb5e0f78312d6461b00c4aca91384c8a0929e3520b8181a6ae421c13dcc2d65f214fc24d927065be609593
-
SSDEEP
24:eFGS2C3zFslT7wEAWbG+52Ar7ZLwTZqjmt+VTMJ:i2CjF6AtmpwTZqjmt+VT2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a5ca5b7dd7eef8e0c6c78dadb96981c0_JaffaCakes118
Files
-
a5ca5b7dd7eef8e0c6c78dadb96981c0_JaffaCakes118.sys windows:5 windows x86 arch:x86
cb05a7a1bc7c3711563fa733672da016
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmUnmapLockedPages
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
KeServiceDescriptorTable
IoFreeMdl
Sections
.text Size: 256B - Virtual size: 214B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 256B - Virtual size: 206B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 50B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ