d:\kill_sys\SYS\i386\Kill.pdb
Static task
static1
General
-
Target
d1e6c8031e743807b70b1a501a6fd22d_JaffaCakes118
-
Size
4KB
-
MD5
d1e6c8031e743807b70b1a501a6fd22d
-
SHA1
97645a96e60be8f23ffd8972e99640ac57413e59
-
SHA256
f18c00dc6e2d3d9c05f3d152abbe398e7adb2f42a63c9fb1d168cde4145efbf2
-
SHA512
cf27d6d82c3e3255625c7fb5c909c5ac1206886e745b0245ed9f76128dcf70e5ac703729a1842e528e03c68a07c108eab660020f5dcd3f40c7f29c068758e9ca
-
SSDEEP
24:e/GSwv7219lTQI4Nwh3AY5t5+wpkWIYkWZpCsTKs3x6QoJbGrxC7jsPTgHdaRwUC:QjcM7+qFxIdsHoJ6reaTg9aRpO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1e6c8031e743807b70b1a501a6fd22d_JaffaCakes118
Files
-
d1e6c8031e743807b70b1a501a6fd22d_JaffaCakes118.sys windows:5 windows x86 arch:x86
5a048a1b77fdb689f4830aab63ea5a53
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
PsLookupProcessByProcessId
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
KeTickCount
KeBugCheckEx
Sections
.text Size: 640B - Virtual size: 606B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 130B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 360B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 98B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ