Static task
static1
General
-
Target
f8864ea5d9a5440cb2a96c4553a0e36a_JaffaCakes118
-
Size
40KB
-
MD5
f8864ea5d9a5440cb2a96c4553a0e36a
-
SHA1
52d041fce63600f3982967ecd6b2a92822e054d6
-
SHA256
49138058f4209ab25e109c67fbe10b83361d9b80bc270f79ca2ad52c169bb9e1
-
SHA512
1cb64ef81bf0586389857eab77dbbc5ee774f1a1ec8aec27505153adc1ce2893370e281bb9c593a8c511b7cdf6f45f3e021f5819437d6ff5d970b7019d0c52a0
-
SSDEEP
768:kFWqs01y4qqMxC9KStkJNXpr1RtOqyIFaX6gmqGpHwU:lq5yVk9KS6bNB/FaXbuHw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8864ea5d9a5440cb2a96c4553a0e36a_JaffaCakes118
Files
-
f8864ea5d9a5440cb2a96c4553a0e36a_JaffaCakes118.sys windows:4 windows x86 arch:x86
bb36d128bfd1fded1cfd2b6d0caa8bf8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitUnicodeString
ZwClose
PsGetVersion
_wcsnicmp
wcslen
_stricmp
swprintf
wcsstr
_wcslwr
ObfDereferenceObject
strncpy
PsLookupProcessByProcessId
RtlCopyUnicodeString
strncmp
IoGetCurrentProcess
ZwOpenKey
ZwSetValueKey
ObReferenceObjectByHandle
RtlAnsiStringToUnicodeString
KeQuerySystemTime
ZwQueryValueKey
PsCreateSystemThread
RtlCompareUnicodeString
ExFreePool
ExAllocatePoolWithTag
MmIsAddressValid
IoDeviceObjectType
wcscat
wcscpy
_wcsicmp
_except_handler3
_snprintf
KeDelayExecutionThread
ZwCreateKey
wcsncpy
wcsrchr
IofCompleteRequest
IoRegisterDriverReinitialization
KeTickCount
KeQueryTimeIncrement
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_snwprintf
wcschr
ZwDeleteKey
ZwCreateFile
ZwSetInformationFile
PsSetCreateProcessNotifyRoutine
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 96B - Virtual size: 85B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ