Static task
static1
General
-
Target
fb1bac4733f40c94e6548c1638a69bb8_JaffaCakes118
-
Size
27KB
-
MD5
fb1bac4733f40c94e6548c1638a69bb8
-
SHA1
f68b91862b40560956fc65db3eeedaa627b73414
-
SHA256
7dee6adecca0e20244055420832a430bde51df7ee357241bf51edf41c499222b
-
SHA512
486e35cf57b29cf90893a354be191cf57d3ed1dd6e64487e74b3c5c320be94a7cd2e3b2373d8a28c2562478afccfde7136ba20f6be443ed26410e1f845075458
-
SSDEEP
384:mrNG4SYVV3ZyE/pCj9fElf164VsQpM4Ie8YCryMoWVB8ubsCpO4FwA+nDj:Y04NLZxmfElf16QSeFhMoWHbbjOCg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb1bac4733f40c94e6548c1638a69bb8_JaffaCakes118
Files
-
fb1bac4733f40c94e6548c1638a69bb8_JaffaCakes118.sys windows:4 windows x86 arch:x86
bbca518ca64092b96b0675fc0e93c88c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
wcslen
wcscat
wcscpy
_stricmp
strncpy
_itow
strncmp
ObfDereferenceObject
MmGetSystemRoutineAddress
_strnicmp
ZwClose
ZwOpenKey
RtlCopyUnicodeString
RtlAnsiStringToUnicodeString
_except_handler3
IofCompleteRequest
swprintf
ExFreePool
_snprintf
ExAllocatePoolWithTag
_wcsnicmp
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 832B - Virtual size: 822B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ