RDPCDD.pdb
Static task
static1
General
-
Target
023fa78c6e52ce11599b13aad92ce028_JaffaCakes118
-
Size
4KB
-
MD5
023fa78c6e52ce11599b13aad92ce028
-
SHA1
6bd94f4cf74e1e00ea7b14474019b02c679de78d
-
SHA256
c071c4c3258bf5e0fd5fd131043c0a8fcec707f69ce1f1854941e046524c140c
-
SHA512
87506a3edc45cde16df1211d26739a4ad4563c8d6a285201f8b42c5e1fed2f8299f52b95795e8bba2e2f06052177205cafc5a590e37d6891e03332e39fe7220d
-
SSDEEP
96:7xBkw/mj6y5nA3mlh1hcmARw1XD7d4ZH7:7xiEeA3uAW5D7WZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 023fa78c6e52ce11599b13aad92ce028_JaffaCakes118
Files
-
023fa78c6e52ce11599b13aad92ce028_JaffaCakes118.sys windows:5 windows x86 arch:x86
dfd91ac6f100c03188a8a3f3778dd205
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ExAllocatePoolWithTag
RtlWriteRegistryValue
ZwCreateFile
RtlAppendUnicodeToString
RtlIntegerToUnicodeString
ExFreePoolWithTag
videoprt.sys
VideoPortInitialize
VideoPortZeroMemory
Sections
.rdata Size: 128B - Virtual size: 111B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PAGE Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 128B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 312B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 128B - Virtual size: 90B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ