E:\tcld\src\objchk\i386\tcld.pdb
Static task
static1
General
-
Target
52f567091cef328d7fae70f0eb22e7af_JaffaCakes118
-
Size
332KB
-
MD5
52f567091cef328d7fae70f0eb22e7af
-
SHA1
c482df99e39ee6bdcb41808bd9fdfd989579871c
-
SHA256
e2f0cedebff5b798b93ecaa78a6791a900578a964bc3c19cea7809c369b9b2a9
-
SHA512
83793d1de820ec5238e58a80a91f41471b809a10043b6f381b33196a2b5ebb54345ff2550c969f6332c28a28f3d2ce8d5a7faca2a49a261477f7c09eac6ef33f
-
SSDEEP
6144:EqfEGTXADtkrNr+F8ec6OUszLz52N45WpTIcHDQg28/pQJanD:dshecgzUsz3ED
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52f567091cef328d7fae70f0eb22e7af_JaffaCakes118
Files
-
52f567091cef328d7fae70f0eb22e7af_JaffaCakes118.sys windows:5 windows x86 arch:x86
f5a7e7bf026ceb558aa9473b2a13f4e4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
wcscpy
ExFreePoolWithTag
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
ExAllocatePoolWithTag
ZwReadFile
ZwClose
ZwQueryInformationFile
ZwOpenFile
ZwWriteFile
ZwCreateFile
wcscat
MmGetSystemRoutineAddress
PsGetVersion
strncmp
IoGetCurrentProcess
ZwMapViewOfSection
ZwCreateSection
_stricmp
ZwUnmapViewOfSection
PsSetCreateProcessNotifyRoutine
IofCompleteRequest
KeWaitForSingleObject
MmUnlockPages
KeInsertQueueApc
KeInitializeApc
KeInitializeEvent
KeUnstackDetachProcess
MmMapLockedPagesSpecifyCache
KeStackAttachProcess
IoFreeMdl
MmProbeAndLockPages
IoAllocateMdl
_except_handler3
KeSetEvent
PsTerminateSystemThread
ZwAllocateVirtualMemory
ZwOpenProcess
PsCreateSystemThread
PsLookupProcessByProcessId
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 373B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 542B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ