d:\works\kernelbots_up15\driver\bypass\bypass\i386\bypass.pdb
Static task
static1
General
-
Target
e26621d5c6db0a32e288f8d2b7f2face_JaffaCakes118
-
Size
61KB
-
MD5
e26621d5c6db0a32e288f8d2b7f2face
-
SHA1
57e40520af2769a3aff6a603680cd1b1fd69159d
-
SHA256
6c477628a58a22451331da743350767346f672e4a0b302d3ae1330d0caf2d52f
-
SHA512
9e862e91d43d0238ad0e4473eacf13b934c66c2dcc25640eacdc4128fae8e57564e9788ac72529f89464d488f0cd99aeeb639bc27dc90eb2c3218babd8b6b252
-
SSDEEP
384:+KQ8m8wtD6Goz+k8B27g1atAPkAu6+O2vDXWEep84/YNRD4i+YJqKIkAXgxgVbP9:c8YZtoz+4rl/Chzrd+SXKbyi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e26621d5c6db0a32e288f8d2b7f2face_JaffaCakes118
Files
-
e26621d5c6db0a32e288f8d2b7f2face_JaffaCakes118.sys windows:5 windows x86 arch:x86
a0f7ac3cc59bed260ccc77499376bc1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmIsAddressValid
KeServiceDescriptorTable
ExFreePoolWithTag
_stricmp
strrchr
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwClose
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
IoDeleteDevice
RtlInitUnicodeString
strncmp
IoGetCurrentProcess
IofCompleteRequest
MmUserProbeAddress
NtBuildNumber
KeBugCheck
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 682B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ