G:\Rootkit\Fuzen\exe\i386\msdirectx.pdb
Static task
static1
General
-
Target
e15ca3704085aa15edfe47458534bbde_JaffaCakes118
-
Size
6KB
-
MD5
e15ca3704085aa15edfe47458534bbde
-
SHA1
2aae61ce354f1b7968bbd40248138a6453ba6096
-
SHA256
7fe63a7ee6f5e9641fcdf876fd96dfac7d2eb36922acb9f04bb59bdf93008825
-
SHA512
5dc4775ca1fcce6a1b911b2a609ee1b60396f3aade972c41b2b0461f7538bebd134d3f0fb335aee2c2b834d866bdfc4e30a4a57a33fe51e63a17b83219403a14
-
SSDEEP
96:MAlrxhK0iU4Jkf09KG3pFrl0pqXJsl7yw7QDqq:MMV09Kf2nry5FQb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e15ca3704085aa15edfe47458534bbde_JaffaCakes118
Files
-
e15ca3704085aa15edfe47458534bbde_JaffaCakes118.sys windows:5 windows x86 arch:x86
a48e0d88d6398030eeb8d151f500e1ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
strncmp
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoGetCurrentProcess
RtlFreeUnicodeString
RtlCompareUnicodeString
RtlAnsiStringToUnicodeString
_snprintf
PsGetCurrentProcessId
DbgPrint
ExFreePoolWithTag
ExAllocatePoolWithTag
IofCompleteRequest
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 524B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ