D:\sys\RST\objchk\i386\ressdX.pdb
Static task
static1
General
-
Target
c09b71f558e920719680226d46aee801_JaffaCakes118
-
Size
2KB
-
MD5
c09b71f558e920719680226d46aee801
-
SHA1
38dce5aaf607ed99ad1c0c5c5ef0758ed9b91915
-
SHA256
50165d4910ffad5bf180a7d0205375f9efb0adde80ebd16a9012614433880783
-
SHA512
bd60b903294e1b7ddf1cfc4791e0983e2faed18729262a9858a8673783ed0f6757e9f6d0df01d34f66eb6bf54e6b985341c21437be67c08ee4dde2b26ce2ce10
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c09b71f558e920719680226d46aee801_JaffaCakes118
Files
-
c09b71f558e920719680226d46aee801_JaffaCakes118.sys windows:5 windows x86 arch:x86
162e100140ec6485c77446096c35e4c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
DbgPrint
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
Sections
.text Size: 1024B - Virtual size: 902B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 324B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ