D:\src\genfs\objfre_wxp_x86\i386\genfs.pdb
Static task
static1
General
-
Target
d586a96f2e9421ffe5cea3413eba60d8_JaffaCakes118
-
Size
68KB
-
MD5
d586a96f2e9421ffe5cea3413eba60d8
-
SHA1
8d44c50ce0db7ca0c8eeff37ba6d04ef39340794
-
SHA256
6f40796a59b6371f2286688c6f97a5e4025e83a6ff5140e6354e96d1d3c3bfe8
-
SHA512
ad9236017361e6178568a6efc06874dff1a8df1dad267454daa7065fd272ab08e76684808147bb68ff8576a817fc64ab9b5c7e1b6fcbc55a0261c646dbdc0a22
-
SSDEEP
384:yTcwtMDamCGvfgwH4r3L3mCrzB1hhcHpp5T/WkX3UdmZ2KfTwyf9hc/i7h5D:mdMumCcfHH4bL3mCri1R8mZ2y0uph5D
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d586a96f2e9421ffe5cea3413eba60d8_JaffaCakes118
Files
-
d586a96f2e9421ffe5cea3413eba60d8_JaffaCakes118.sys windows:5 windows x86 arch:x86
04ef9b14474ae26cc7f5fd523baabff3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
ExFreePoolWithTag
RtlCompareUnicodeString
ExAllocatePoolWithTag
ExQueueWorkItem
IoAttachDeviceToDeviceStack
DbgPrint
KeDelayExecutionThread
RtlCopyUnicodeString
ObQueryNameString
ObfDereferenceObject
RtlAppendUnicodeToString
RtlAppendUnicodeStringToString
ObfReferenceObject
ZwClose
ZwQueryValueKey
ZwOpenKey
KeWaitForSingleObject
IoBuildDeviceIoControlRequest
KeInitializeEvent
RtlEqualUnicodeString
IoDeleteDevice
IoDetachDevice
IoCreateDevice
_except_handler3
MmIsAddressValid
ObReferenceObjectByName
IoDriverObjectType
KeSetPriorityThread
KeGetCurrentThread
ObReferenceObjectByHandle
PsCreateSystemThread
RtlCompareMemory
IoStartTimer
IoGetDeviceObjectPointer
IoRegisterFsRegistrationChange
KeSetEvent
IoCreateSymbolicLink
wcstombs
IoFreeWorkItem
IoQueueWorkItem
IoAllocateWorkItem
_vsnprintf
strncmp
IoGetCurrentProcess
IoFreeIrp
IoAllocateIrp
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
IoInitializeTimer
RtlWriteRegistryValue
wcslen
RtlQueryRegistryValues
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
strncpy
KeBugCheck
_strnicmp
_wcsnicmp
FsRtlDissectName
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
_stricmp
PsGetCurrentProcessId
ZwWriteFile
IoCreateFileSpecifyDeviceObjectHint
ZwReadFile
ZwCreateFile
ZwSetValueKey
ZwEnumerateValueKey
ZwEnumerateKey
ZwQueryKey
KeServiceDescriptorTable
IofCallDriver
PsGetVersion
RtlInitUnicodeString
IoDeleteSymbolicLink
MmGetSystemRoutineAddress
hal
ExAcquireFastMutex
ExReleaseFastMutex
KeGetCurrentIrql
HalReturnToFirmware
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ