Static task
static1
General
-
Target
00d2781630fa63a54d7ccff9e2277ff0_JaffaCakes118
-
Size
27KB
-
MD5
00d2781630fa63a54d7ccff9e2277ff0
-
SHA1
2e7a4538fa37d7cf13341efecd0e133fda8a55a6
-
SHA256
7cdd7085f8e093057fc8170061a0217cd025ed5a08ae5d32e5dcc6d61a45e7df
-
SHA512
3eaa4cdd6cb72bce409030a7200b4a5e3b4e0f6d6a628a40fb00315c109328683a4a7a2bdd8319a0875458cdf5868b8cc5b0a52bd29119b925411ee5a91106e1
-
SSDEEP
768:8OomO3Coy6g21NBZEsXJ0smV8+pTFNy1YH+Y:m3LvvGTv+Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00d2781630fa63a54d7ccff9e2277ff0_JaffaCakes118
Files
-
00d2781630fa63a54d7ccff9e2277ff0_JaffaCakes118.sys windows:4 windows x86 arch:x86
252086b71ed89ab21ffe4368c3988a3e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeServiceDescriptorTable
ExFreePool
_snprintf
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwClose
ZwUnmapViewOfSection
_stricmp
RtlInitUnicodeString
_strnicmp
RtlCopyUnicodeString
MmIsAddressValid
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
MmGetSystemRoutineAddress
wcscpy
wcscat
IofCompleteRequest
strncpy
IoGetCurrentProcess
swprintf
_except_handler3
_wcsnicmp
wcslen
ObfDereferenceObject
ObQueryNameString
RtlAnsiStringToUnicodeString
strncmp
RtlCompareUnicodeString
ExGetPreviousMode
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 756B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ