C:\sys.pdb
Static task
static1
General
-
Target
25f2099c049cbabbc00e06b2a5dba3b2_JaffaCakes118
-
Size
6KB
-
MD5
25f2099c049cbabbc00e06b2a5dba3b2
-
SHA1
1d8afef15197576a875f4a14b0ec9934197ce1e9
-
SHA256
26d42873373be440fafd88caa161ac8a1d46b3d9d9c0eed1f7bacc236028089b
-
SHA512
7a683883a52e200e2ae63f7fc89f3088fb73fe920238e81d2c7f723b0b7fb51387e6d1a592e6bcdf4a6be849a235571548642d8d290158a28b2c832555fe32f4
-
SSDEEP
96:IbXQq+UEPfvH2FvQ2/F+ERyazGP4fvl/J9eNs4VpNLFREXQcA:I5+UEP3H2FImfRyazGP6l/bcs4j8Qc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 25f2099c049cbabbc00e06b2a5dba3b2_JaffaCakes118
Files
-
25f2099c049cbabbc00e06b2a5dba3b2_JaffaCakes118.sys windows:5 windows x86 arch:x86
d195fa556ee06658c092b3be022ee00b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
MmMapLockedPagesSpecifyCache
memset
ObReferenceObjectByName
IoDeleteSymbolicLink
IoDeleteDevice
ZwSetValueKey
ZwClose
IofCompleteRequest
ExFreePoolWithTag
KeServiceDescriptorTable
IoCreateSymbolicLink
IoCreateDevice
_wcsnicmp
IoGetCurrentProcess
MmIsAddressValid
swprintf
ObfDereferenceObject
ObReferenceObjectByPointer
ExAllocatePoolWithTag
PsGetVersion
memcpy
_except_handler3
hal
KfRaiseIrql
KfLowerIrql
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 560B - Virtual size: 548B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 224B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 688B - Virtual size: 680B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 464B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ