d:\works\kernelbots_up22\driver\bypass\bypass\i386\bypass.pdb
Static task
static1
General
-
Target
af423182a334138976ec8654b93c3ffc_JaffaCakes118
-
Size
63KB
-
MD5
af423182a334138976ec8654b93c3ffc
-
SHA1
68fb71d137822200c522b622b812a0a171615f28
-
SHA256
3ff7d974dced32f6beb392b474f13d4fc3dda3b4f6da4a364348ceed25153b0a
-
SHA512
33387eb9b595983d5f019c27dad56effaf3ea4c7a42750426b0b1ded01c373571be1dd707da59b0d6c30c9f396a23e4ca314c2e3567a08248e5ffdb7e2980a20
-
SSDEEP
384:f+WeKYWzfZ/FD6GoSuP0tSzYCTsw8TJ0QhWdSZyrj6qFbucVQgQc8TQ29c9NlimB:f++YW9/Bto5dbjS+C9TXiFCSY8v3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource af423182a334138976ec8654b93c3ffc_JaffaCakes118
Files
-
af423182a334138976ec8654b93c3ffc_JaffaCakes118.sys windows:5 windows x86 arch:x86
75fa894127f2ca79e03145c1c1018425
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmIsAddressValid
KeServiceDescriptorTable
ExFreePool
_stricmp
strrchr
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwClose
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
ObReferenceObjectByHandle
ZwOpenProcess
wcslen
_strnicmp
KeDetachProcess
MmHighestUserAddress
ZwQueryInformationProcess
KeAttachProcess
IoDeleteDevice
RtlInitUnicodeString
IofCompleteRequest
MmUserProbeAddress
NtBuildNumber
KeBugCheck
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
strstr
_strupr
strncpy
ExFreePoolWithTag
DbgPrint
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 884B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ