C:\sys.pdb
Static task
static1
General
-
Target
2f8190719768cb509e6b9ceffdcffa22_JaffaCakes118
-
Size
16KB
-
MD5
2f8190719768cb509e6b9ceffdcffa22
-
SHA1
59da1c03fc5788d15fb652992b16bd87867782ea
-
SHA256
e71f4fc381dd208df3a855bb3a7f9cd3f0c4d57cddcd58ea38835cc422beebc8
-
SHA512
65ba78329f414fdc2908fc66547e38cc2661e9662b0a617f79e2b1a5076a758747749ba92db2f34b1d7da5cbb8b99fe0e9d1b630457bab503549fdc2941cf436
-
SSDEEP
192:rOM42aU7zfq1CZh04WhiK2apvw4tKDKPTP1UGMT1bC5eWHlbqhUAEM+JuuWt:tftGw4QDi921bC5eWHAEHJuR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f8190719768cb509e6b9ceffdcffa22_JaffaCakes118
Files
-
2f8190719768cb509e6b9ceffdcffa22_JaffaCakes118.sys windows:5 windows x86 arch:x86
9ae71f14c2f4a803e9e9e77b581c3c77
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmMapLockedPagesSpecifyCache
memset
IoDeleteSymbolicLink
_wcsnicmp
RtlInitUnicodeString
IoDeleteDevice
RtlGetVersion
ZwSetValueKey
ZwClose
IofCompleteRequest
KeServiceDescriptorTable
IoCreateSymbolicLink
MmIsAddressValid
ObfDereferenceObject
ExFreePoolWithTag
IoCreateDevice
IoCompleteRequest
strlen
swprintf
wcsrchr
ObReferenceObjectByHandle
RtlMultiByteToUnicodeN
wcscpy
ZwOpenKey
IoGetCurrentProcess
PsLookupProcessByProcessId
ObReferenceObjectByPointer
PsGetThreadProcessId
ExAllocatePoolWithTag
ObReferenceObjectByName
memcpy
_except_handler3
hal
KfRaiseIrql
KfLowerIrql
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 448B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 886B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 656B - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ