c:\winddk\demo\repairssdt\bin\i386\RepairSSDT.pdb
Static task
static1
General
-
Target
29108ef13b36cc57e791a2fded4734d3_JaffaCakes118
-
Size
29KB
-
MD5
29108ef13b36cc57e791a2fded4734d3
-
SHA1
0f59e04b86f3608cd29dd185f03163f5a1f50052
-
SHA256
698ee19c945525922f14038ab440be42606968f26b06423b5fd28e4dd4729ddf
-
SHA512
8de78d7b048afecd119310cca3435f1d7d90416a835dccd369a710f5bcc9b58d8c733921ab7318675ad7ee316e37ab39d84f226b5d2bb7331607b4bbff94f1fb
-
SSDEEP
384:K5stwTWN5QPjPya1myuk9k3rncI4NdwQ30qbMxk9UknLg29rGYJLDCRbCh1IX1:K5gNKPjPyDXJGwQkqekZLgY/LQbCgF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29108ef13b36cc57e791a2fded4734d3_JaffaCakes118
Files
-
29108ef13b36cc57e791a2fded4734d3_JaffaCakes118.sys windows:6 windows x86 arch:x86
eec808b71158ea85e48fd1cddce7b8e9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IofCompleteRequest
KeServiceDescriptorTable
IoCreateSymbolicLink
IoIsWdmVersionAvailable
IoCreateDevice
KeTickCount
RtlUnwind
KeBugCheckEx
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 412B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ