c:\programs\siberia2\protect\objfre_wxp_x86\i386\protect.pdb
Static task
static1
General
-
Target
0e9aa9365bdcd322b55b89b36c80afdd_JaffaCakes118
-
Size
32KB
-
MD5
0e9aa9365bdcd322b55b89b36c80afdd
-
SHA1
354764c421196cb171fd79708e23a875160c65ce
-
SHA256
df26a4cc29ae7d32ac9327dc849d40e52571dd4b76926a33b3d7ea8a19e2bb02
-
SHA512
a5b52aa949e7b45629949e4696e8d1cfd68b1116d2c00980e836ff4b7a8748540d5876baf5ddc095a5d8536c527f1fb462a9f74a2138efc84e29a2be69b5ae9e
-
SSDEEP
384:uvleNOjLmE/7oD+n/vG0TVwu9NwBuUdjGV0zK/xx88aVk8SwEN57iielcRnnqhLn:PyDoSnWCc1ZS0zK/OsN57eKq2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0e9aa9365bdcd322b55b89b36c80afdd_JaffaCakes118
Files
-
0e9aa9365bdcd322b55b89b36c80afdd_JaffaCakes118.sys windows:6 windows x86 arch:x86
b51d29b3530d25827573676942998e55
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
memcpy
ExFreePoolWithTag
ExAllocatePoolWithTag
ZwQuerySystemInformation
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 145B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 256B - Virtual size: 156B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 110B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ