I:\1030\sys\Driver\i386\Killer.pdb
Static task
static1
General
-
Target
f5946b519f431c4300850658b7265bf0_JaffaCakes118
-
Size
11KB
-
MD5
f5946b519f431c4300850658b7265bf0
-
SHA1
c6bac1b298270fcd7fa63669eda3031649699afc
-
SHA256
64ab371a1f4fca9448c6656fb51be59609238988436bb31769a5d46a1ad3b3d8
-
SHA512
a367cd8c7bf00063ebbcbc691b6659bd4481e51a9191ec69ce9caae31a68475bdd556b9cd2fd0d153f1ed2d8ddf64e32b36a78bab5e84fa8a1000a6151316e83
-
SSDEEP
192:zdhm5BEGAeyPkUXxb1gfAeZwSo276b0aQIOfQDqrLqlFfiY0:zu5BEXb1gfAgolIwO7rLOJd0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5946b519f431c4300850658b7265bf0_JaffaCakes118
Files
-
f5946b519f431c4300850658b7265bf0_JaffaCakes118.sys windows:5 windows x86 arch:x86
27963d845fae12a11f6b7b544b341c80
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitUnicodeString
DbgPrint
IoFreeIrp
KeSetEvent
IoFreeMdl
MmUnlockPages
IoDeleteDevice
IoDeleteSymbolicLink
_stricmp
strrchr
ExFreePoolWithTag
ExAllocatePoolWithTag
ZwQuerySystemInformation
ObfDereferenceObject
IoDriverObjectType
ZwClose
ZwReadFile
MmIsAddressValid
IoCreateFile
KeWaitForSingleObject
KeGetCurrentThread
MmProbeAndLockPages
IoAllocateMdl
IoAllocateIrp
KeInitializeEvent
KdDisableDebugger
KeServiceDescriptorTable
ProbeForWrite
IofCompleteRequest
ObReferenceObjectByHandle
IoFileObjectType
_allmul
IoCreateSymbolicLink
IoCreateDevice
_except_handler3
IoGetCurrentProcess
ZwQueryInformationFile
ProbeForRead
hal
KeGetCurrentIrql
KeStallExecutionProcessor
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 896B - Virtual size: 847B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 640B - Virtual size: 614B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 560B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ