d:\koproject\driver\bypass\objfre_win7_x86\i386\NTHRNN.pdb
Static task
static1
General
-
Target
ffa16db66c365cb78c29a5282bd16306_JaffaCakes118
-
Size
6KB
-
MD5
ffa16db66c365cb78c29a5282bd16306
-
SHA1
350c08b6a765e92d39b3c56ec23fc4568aa3ec10
-
SHA256
a57fe4859d233c9cbb63fe2ab3d6dc049f044e73914dcf530e0d710a000fbb10
-
SHA512
a69aa676d96be80684309105bcf10e2676de06e2c89d5b30c926f187bec7de84df3b4476fd8efefab6c672cbe6f51a885d6b2e8f83f9c93b191105a383e20190
-
SSDEEP
48:iceY3fTolOdn9mJoL1Zo584TQq1nYiQIAdeoHYJFmFE/FVgz7CRGAaD:xolOdn9mWL1C7YaGvYJFxeCU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ffa16db66c365cb78c29a5282bd16306_JaffaCakes118
Files
-
ffa16db66c365cb78c29a5282bd16306_JaffaCakes118.sys windows:6 windows x86 arch:x86
087e17f144b806fa67aeb64b76d10353
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ExFreePoolWithTag
RtlCopyUnicodeString
ExAllocatePoolWithTag
MmGetSystemRoutineAddress
RtlInitUnicodeString
KeServiceDescriptorTable
IofCompleteRequest
RtlRandomEx
IoDeleteDevice
IoDeleteSymbolicLink
memcpy
memset
PsTerminateSystemThread
PsCreateSystemThread
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 279B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 1024B - Virtual size: 872B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 758B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ