Static task
static1
General
-
Target
f9b0d12306a8a1d207cf4b9a1d6c4027_JaffaCakes118
-
Size
4KB
-
MD5
f9b0d12306a8a1d207cf4b9a1d6c4027
-
SHA1
f456aacc4c2a7b8a391f1c77d17a6728a3f06477
-
SHA256
0397a4782694c37d4163a7107b10c6928b369839f1da8d7b16bac75692dfdc11
-
SHA512
179dd7cb6f1f0ad777f72d62619084836f6188c4170c19843a33648b2179092473217319e426bee1703d0941c3ef85edd9626c06df60f36bc2f9c279656b9781
-
SSDEEP
48:i4UCyeo4Nv0pn84cCCLkwerPjIMbvMyuqYBj92tQibEx4QDmlw7Vqelqm6fyae6l:tro+Mp84+Lk1CLi/krVC/w/sw39mZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f9b0d12306a8a1d207cf4b9a1d6c4027_JaffaCakes118
Files
-
f9b0d12306a8a1d207cf4b9a1d6c4027_JaffaCakes118.sys windows:4 windows x86 arch:x86
cdab88fe925b8651fe8f34e7ff86924f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
IoGetDeviceObjectPointer
IoRegisterDriverReinitialization
ObDereferenceObject
ObReferenceObjectByHandle
ObReferenceObjectByName
ZwAccessCheckAndAuditAlarm
ZwClose
ZwOpenDirectoryObject
MmUserProbeAddress
KeServiceDescriptorTable
IoDriverObjectType
DbgPrint
IofCompleteRequest
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 544B - Virtual size: 520B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 160B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ