C:\WINDDK\2600\ressdt\objchk\i386\ressdt.pdb
Static task
static1
General
-
Target
da1e876290faa5b03aab6749cac795fc_JaffaCakes118
-
Size
4KB
-
MD5
da1e876290faa5b03aab6749cac795fc
-
SHA1
7827b7bf88e644fc81ae8c1664992e162116407a
-
SHA256
7134ec99abfabec76e574ec9ce74244745019596c0b893a918ffa8458c6d4c40
-
SHA512
9415a4a9f802d5f7430e653f24b76611fd61c46c6a19afc26044be214535217d6bba1f43c75866304532c76d7eddf0b0081c1224674e454d1b3b11cd189250e5
-
SSDEEP
48:q37LuaqMEVNco5elliSi1WdRrJVcN1Co+sjIZWQ7q2ue5WwGD+:MLWD0NiSiYd1I7X+MEWKLu+Ww8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da1e876290faa5b03aab6749cac795fc_JaffaCakes118
Files
-
da1e876290faa5b03aab6749cac795fc_JaffaCakes118.sys windows:5 windows x86 arch:x86
10c5d312b06ca823f76f05c6f2f6279b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IofCompleteRequest
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 768B - Virtual size: 708B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 161B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 90B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ