E:\sss\1212\Driver\i386\Killer.pdb
Static task
static1
General
-
Target
ff496f71dd8e5f367b692ab269160c6f_JaffaCakes118
-
Size
16KB
-
MD5
ff496f71dd8e5f367b692ab269160c6f
-
SHA1
9e7bfe182035605c9f7839007cc3ece2633cd657
-
SHA256
6e5c1c2ef19160cd7318608277987e8a8083c341a04260840b93b3c29ad6b3be
-
SHA512
b9f7197a0dccc97dab959f46418247c63547553ab3ddbae7abe8345986f492ae67229bd3df150add29fdb904b600b7c9b3fac99e99c8e66b7d5e088d007123f0
-
SSDEEP
192:zUWthL7XoOoHtZj8fAi49yQWrhLqF/41Tr45OdQPaMlbF15tfJ:zbjyB8fAbshL+/+T85O6PaMlr5r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff496f71dd8e5f367b692ab269160c6f_JaffaCakes118
Files
-
ff496f71dd8e5f367b692ab269160c6f_JaffaCakes118.sys windows:5 windows x86 arch:x86
27963d845fae12a11f6b7b544b341c80
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitUnicodeString
DbgPrint
IoFreeIrp
KeSetEvent
IoFreeMdl
MmUnlockPages
IoDeleteDevice
IoDeleteSymbolicLink
_stricmp
strrchr
ExFreePoolWithTag
ExAllocatePoolWithTag
ZwQuerySystemInformation
ObfDereferenceObject
IoDriverObjectType
ZwClose
ZwReadFile
MmIsAddressValid
IoCreateFile
KeWaitForSingleObject
KeGetCurrentThread
MmProbeAndLockPages
IoAllocateMdl
IoAllocateIrp
KeInitializeEvent
KdDisableDebugger
KeServiceDescriptorTable
ProbeForWrite
IofCompleteRequest
ObReferenceObjectByHandle
IoFileObjectType
_allmul
IoCreateSymbolicLink
IoCreateDevice
_except_handler3
IoGetCurrentProcess
ZwQueryInformationFile
ProbeForRead
hal
KeGetCurrentIrql
KeStallExecutionProcessor
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 896B - Virtual size: 847B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 640B - Virtual size: 614B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 446B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ