D:\sys\ressdt\objchk\i386\ressdt.pdb
Static task
static1
General
-
Target
c8b6f28957ccfecbc1a1c39c41a1146b_JaffaCakes118
-
Size
4KB
-
MD5
c8b6f28957ccfecbc1a1c39c41a1146b
-
SHA1
58fc361b76c781c103a631547483107b70bfb841
-
SHA256
4ced4160b7deeb3d97933101e1201b0b7c6e670347e7eb9c3562ffab76def174
-
SHA512
498c1cc98479a8efa45f2125ebf1c31f42b386243bc43d04108c841fbcd641c6d6740f88074d8d8ed718c7c32a09210958c8f70a6d5bfa35f14ca5879f7bedeb
-
SSDEEP
48:qUK4kRelbpuSqMEDwBV+xVcNLRr0GV7Co+sjIZWQ7q2ue5WwGD+:4UpuSqFD6V+gt197X+MEWKLu+Ww8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c8b6f28957ccfecbc1a1c39c41a1146b_JaffaCakes118
Files
-
c8b6f28957ccfecbc1a1c39c41a1146b_JaffaCakes118.sys windows:5 windows x86 arch:x86
3adec6f4fdfe8afc7ea47157079c877c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
Sections
.text Size: 768B - Virtual size: 724B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 90B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ