F:\UnhookDriver\i386\Driver.pdb
Static task
static1
General
-
Target
c290dd0b33047e0681624823785ab14f_JaffaCakes118
-
Size
4KB
-
MD5
c290dd0b33047e0681624823785ab14f
-
SHA1
55fd6aaf0060bbacbf348d3bbfda6a3eeb383351
-
SHA256
def06c1fdfef5deb1ddeecb11ec6101b7783e7257cc4283da3ebafde150896a4
-
SHA512
e402bbbd7eacafc2311b09ad63968335a21821e8d61923f5fff07cdac833a8e792ab1200df9e9d1b815a31a4b4393ed1713c9d389d85324c45d959420436d06c
-
SSDEEP
48:6/UXi9yr5Tu7bSLni7h9h1LWRMQmt+Vm:ry9guHj7h9h1LWRPo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c290dd0b33047e0681624823785ab14f_JaffaCakes118
Files
-
c290dd0b33047e0681624823785ab14f_JaffaCakes118.sys windows:5 windows x86 arch:x86
148830e6c63604d00c58907d55fdc1aa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmUnmapLockedPages
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
KeServiceDescriptorTable
DbgPrint
IoFreeMdl
Sections
.text Size: 256B - Virtual size: 240B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 256B - Virtual size: 222B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 54B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ