c:\sys\i386\Sys.pdb
Static task
static1
General
-
Target
fb6b608bd22b5750cda597e26da24a96_JaffaCakes118
-
Size
3KB
-
MD5
fb6b608bd22b5750cda597e26da24a96
-
SHA1
f7a00ac5881b7ef9f5ac95db3ee096a982c9ba7f
-
SHA256
865ef9c264423856079ea108159ea85428e68707138ba9516c204afd110434af
-
SHA512
a53c13cbd5c5188bf0f01012fee4362ff3f0e8b7f48073efca8a3cc8a44edf95b9594763f86989727addf34dd9a50363220dec8b6fbd13276ff9f386b217f944
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb6b608bd22b5750cda597e26da24a96_JaffaCakes118
Files
-
fb6b608bd22b5750cda597e26da24a96_JaffaCakes118.sys windows:5 windows x86 arch:x86
79c1e91c7b9bd7851e96f829456df9c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoCreateUnprotectedSymbolicLink
IoCreateDevice
RtlInitUnicodeString
KeTickCount
Sections
.text Size: 896B - Virtual size: 808B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 130B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ