c:\winddk\demo\repairssdt\bin\i386\RepairSSDT.pdb
Static task
static1
General
-
Target
55e1ef32ff5dd989bfc0df9162806193_JaffaCakes118
-
Size
13KB
-
MD5
55e1ef32ff5dd989bfc0df9162806193
-
SHA1
ad1cc0938543e56cdff0f8f023d4e07fbc75f5c6
-
SHA256
ba00f168e35ed7465aa6e25c2f15816b38465aaf29778a494c22a42f42190155
-
SHA512
fb99c1955b2cb63aec550cf2c75b4d2640d84abff53da705a4634f10207aea97748fc1cacb8824eb30147f9f98c74f241e62d3af06aa2323d102167d5bd93289
-
SSDEEP
192:K5stOpRTrUyywc8FI39yowJL/aMjGwP7VMRJfwycSGZ+ebMV1TMyD:K5stwTwzw3FU9YJLW7wycJbgD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55e1ef32ff5dd989bfc0df9162806193_JaffaCakes118
Files
-
55e1ef32ff5dd989bfc0df9162806193_JaffaCakes118.sys windows:6 windows x86 arch:x86
7e24bc0e71b87bffe59745a057fad51b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IofCompleteRequest
KeServiceDescriptorTablf
IoCreateSymbolicLink
IoIsWdmVersionAvailable
IoCreateDevice
KeTickCount
RtlUnwind
KeBugCheckEx
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 412B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ