C:\sys.pdb
Static task
static1
General
-
Target
16eca44880d71548ef30560907f85c87_JaffaCakes118
-
Size
32KB
-
MD5
16eca44880d71548ef30560907f85c87
-
SHA1
7c9ea3192bef6ca66682e2eb12f6c5142dd8ae76
-
SHA256
d81cf6fd8a3c3ee81b5b01809b7cfc7d3b1d4ae3e9f7783d954fca7eb302cc37
-
SHA512
35903e28f487df1b947e4298961e383dd1f39ceb69df1d7445e7851647cbd9a8ae27427676a6b2819d9a5421879d8b0711ff4dff71fd6910ae65c136c13ccdc0
-
SSDEEP
768:hGw4QC6GjofFQiUw/snZ7PtMqbX8TQTweh:hfChjSkwghMiTweh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16eca44880d71548ef30560907f85c87_JaffaCakes118
Files
-
16eca44880d71548ef30560907f85c87_JaffaCakes118.sys windows:5 windows x86 arch:x86
9ae71f14c2f4a803e9e9e77b581c3c77
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmMapLockedPagesSpecifyCache
memset
IoDeleteSymbolicLink
_wcsnicmp
RtlInitUnicodeString
IoDeleteDevice
RtlGetVersion
ZwSetValueKey
ZwClose
IofCompleteRequest
KeServiceDescriptorTable
IoCreateSymbolicLink
MmIsAddressValid
ObfDereferenceObject
ExFreePoolWithTag
IoCreateDevice
IoCompleteRequest
strlen
swprintf
wcsrchr
ObReferenceObjectByHandle
RtlMultiByteToUnicodeN
wcscpy
ZwOpenKey
IoGetCurrentProcess
PsLookupProcessByProcessId
ObReferenceObjectByPointer
PsGetThreadProcessId
ExAllocatePoolWithTag
ObReferenceObjectByName
memcpy
_except_handler3
hal
KfRaiseIrql
KfLowerIrql
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 886B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 656B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ