RDPCDD.pdb
Static task
static1
General
-
Target
0ec53389a42672a70abda6b7afddcb87_JaffaCakes118
-
Size
4KB
-
MD5
0ec53389a42672a70abda6b7afddcb87
-
SHA1
16f5576cac537410339833d235e4876cbaa7d56c
-
SHA256
798ea62b26d0341b7cc1c632ab37dbe7e58ea5f46ed814631d0ca85921999b9b
-
SHA512
16bc44ae7ce7772762e7ddb44ea070bc740226144952c4be504ac6c7004c285525bef753be8456e9a18e132b9061ab7e67181cebf91d8d454139be2c63634a6d
-
SSDEEP
96:7xBbw/mj6y5nA3mlh1hcmAUwDkwd+voyv:7x5EeA3uA7Dkw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ec53389a42672a70abda6b7afddcb87_JaffaCakes118
Files
-
0ec53389a42672a70abda6b7afddcb87_JaffaCakes118.sys windows:5 windows x86 arch:x86
dfd91ac6f100c03188a8a3f3778dd205
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ExAllocatePoolWithTag
RtlWriteRegistryValue
ZwCreateFile
RtlAppendUnicodeToString
RtlIntegerToUnicodeString
ExFreePoolWithTag
videoprt.sys
VideoPortInitialize
VideoPortZeroMemory
Sections
.rdata Size: 128B - Virtual size: 111B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PAGE Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 128B - Virtual size: 92B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 312B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 128B - Virtual size: 90B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ