c:\winddk\demo\repairssdt\bin\i386\RepairSSDT.pdb
Static task
static1
General
-
Target
bec1f5d42069e501001601a0fcf4bb6b_JaffaCakes118
-
Size
7KB
-
MD5
bec1f5d42069e501001601a0fcf4bb6b
-
SHA1
569b6a593e1c284f57cc1cb960af742aa027a59a
-
SHA256
286570967120cfdc9f4239d9fd8786b313fbaaf8171e1a5a584c763ab08f2ee4
-
SHA512
86a03f95178d81b23ffca5a04cd7e6069af4cd68868e2223393a41261be3c8a6d763771df9cd8619a37301ac8b5b34f41c934bc8263584c45a8f64bb33b63a45
-
SSDEEP
96:Dja5sxZ0oRc1pRTtg1VmpQl+GkD9Z5u3E:K5stOpRTWhHkpu0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bec1f5d42069e501001601a0fcf4bb6b_JaffaCakes118
Files
-
bec1f5d42069e501001601a0fcf4bb6b_JaffaCakes118.sys windows:6 windows x86 arch:x86
eec808b71158ea85e48fd1cddce7b8e9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IofCompleteRequest
KeServiceDescriptorTable
IoCreateSymbolicLink
IoIsWdmVersionAvailable
IoCreateDevice
KeTickCount
RtlUnwind
KeBugCheckEx
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 412B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ