C:\sys.pdb
Static task
static1
General
-
Target
0143cf139c8f4d0ec912c7553fc61f38_JaffaCakes118
-
Size
12KB
-
MD5
0143cf139c8f4d0ec912c7553fc61f38
-
SHA1
5d31f7b8088c91cff1e5d7c643c4430687864bf6
-
SHA256
ece9fddf937d965f9e0e2793a835fae9ee2c0215b4e8e513134da7ef1ded6b3c
-
SHA512
3ee415439ac0cc12f931d6830b44ee296cd7347e710f96da6ea5615c0ecc5cbc9cce89fa35a1452300f1cc4697c45ea17429468a5e48fb79dee99af2e60fcf54
-
SSDEEP
192:3V+jEWPw1yQGUTK9b2hWqwfrZYq1HaA/wN3jbwMyIlpk3dyKQxev:3V+f3Q22gqAX/w3+IlC30nev
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0143cf139c8f4d0ec912c7553fc61f38_JaffaCakes118
Files
-
0143cf139c8f4d0ec912c7553fc61f38_JaffaCakes118.sys windows:5 windows x86 arch:x86
6f1c1a52434a78f0f2197f651ee5edc0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
memset
ObReferenceObjectByName
memcpy
IoDeleteSymbolicLink
_wcsnicmp
strlen
RtlInitUnicodeString
IoDeleteDevice
swprintf
RtlGetVersion
wcsrchr
ZwClose
IofCompleteRequest
MmMapLockedPagesSpecifyCache
IoCreateSymbolicLink
MmIsAddressValid
IoCreateDevice
wcscpy
PsGetCurrentThreadId
wcslen
ObReferenceObjectByHandle
ObfDereferenceObject
RtlMultiByteToUnicodeN
ZwOpenKey
IoGetCurrentProcess
ObReferenceObjectByPointer
PsGetThreadProcessId
ExFreePoolWithTag
KeServiceDescriptorTable
ExAllocatePoolWithTag
_except_handler3
hal
KfRaiseIrql
KfLowerIrql
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 576B - Virtual size: 564B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 864B - Virtual size: 850B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 768B - Virtual size: 754B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ