Static task
static1
General
-
Target
4c7976c2872dd70fb7f3780c31ea7fa5_JaffaCakes118
-
Size
932KB
-
MD5
4c7976c2872dd70fb7f3780c31ea7fa5
-
SHA1
e14ec98ff28e7e747f8896334552389baf30ca11
-
SHA256
0ce7c3c3db45ecefbf803bf808d85b2fde48c29d6d7cc1cd5fdc6cf983b24329
-
SHA512
6f9f67e77682794722cc18ae10967de455b19880ee47c3a7a2324564ccc9e5906f8cc29a0edc49d6f57ea4b41c8c2427fec1af42af1b20d518786f2e806706ca
-
SSDEEP
12288:vGAV6qSDDalji827VmanEELpEQdDGjAiY3zuAFTJrEWgYKBJyijeq:+A6ylKpxLbNlzDZtEt3WPq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4c7976c2872dd70fb7f3780c31ea7fa5_JaffaCakes118
Files
-
4c7976c2872dd70fb7f3780c31ea7fa5_JaffaCakes118.sys windows:10 windows x64 arch:x64
9f85c4892266dfa46a0c14183038b4f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
KeAcquireSpinLockRaiseToDpc
KeReleaseSpinLock
strstr
RtlInitUnicodeString
DbgPrint
DbgPrintEx
ExAllocatePoolWithTag
ExFreePoolWithTag
MmGetSystemRoutineAddress
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
IoGetCurrentProcess
ObRegisterCallbacks
ObUnRegisterCallbacks
ZwClose
PsSetCreateProcessNotifyRoutine
PsSetCreateThreadNotifyRoutine
PsRemoveCreateThreadNotifyRoutine
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
PsGetCurrentProcessId
PsGetProcessId
PsLookupProcessByProcessId
ObOpenObjectByPointer
PsProcessType
KeBugCheckEx
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 531KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PAGE Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp0 Size: 882KB - Virtual size: 882KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 140B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ