Static task
static1
General
-
Target
f56004df988a1f31bb0a46da701a80fd_JaffaCakes118
-
Size
25KB
-
MD5
f56004df988a1f31bb0a46da701a80fd
-
SHA1
f54c4454a48a4a14869a0a52b5908020cbbcd93c
-
SHA256
bd2943d6ac9a931378d016a0f6af58213e6188d86a3de29c8eb1bc47dcaab3db
-
SHA512
d42b565b900ef934896d20c52049693a14dfdc847a289023045e09390be9eb7df88f54b79199a665ab480a2764b6ece282ec0ec72eaeb273b3c8b315fedacee6
-
SSDEEP
768:mnNqEg+UrZmHpVDy9Q+cnU/vafYFDe0wGd5mjsLSG:c8EgTZmHpVDSQ+cnIafYFDe0wG1P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f56004df988a1f31bb0a46da701a80fd_JaffaCakes118
Files
-
f56004df988a1f31bb0a46da701a80fd_JaffaCakes118.sys windows:5 windows x86 arch:x86
35e530c00cd606aaac8119d97714a272
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
RtlInitUnicodeString
IoGetCurrentProcess
ExGetPreviousMode
KeServiceDescriptorTable
ZwSetValueKey
PsGetVersion
_wcsnicmp
wcslen
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
ZwClose
ZwCreateFile
IoRegisterDriverReinitialization
ExFreePool
wcscpy
ZwEnumerateKey
wcscat
ExAllocatePoolWithTag
ZwOpenKey
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ZwQueryInformationFile
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
PsCreateSystemThread
ZwQueryValueKey
_except_handler3
_strnicmp
strncmp
strncpy
wcsncmp
towlower
KeDelayExecutionThread
IofCompleteRequest
wcsstr
ZwDeleteValueKey
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 768B - Virtual size: 760B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ