Static task
static1
General
-
Target
00f1853a1272769c2900e83615ac02e1_JaffaCakes118
-
Size
22KB
-
MD5
00f1853a1272769c2900e83615ac02e1
-
SHA1
0e1223ec7259e2de6443f86f7cbd6b7949bff797
-
SHA256
4097a2e39371421068b95d489684cd98510365065bf7464bc38d91d00361a2b0
-
SHA512
cbcba911880c568ef65139bbbd89eb8313f5894eaba5e9501961235cb83934a89bf78f10e075b5684cf67bb1e0d7c2048db869ffd0f403540f199d9fb75025e9
-
SSDEEP
384:O1BKmbW8YF2Dn2GLxy5dbpw0al65AkfYSv6GFKpQQY62FE2EzsIJQ9oJIpQkUj6H:g+wxyval6lboQvUQxMK3GC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00f1853a1272769c2900e83615ac02e1_JaffaCakes118
Files
-
00f1853a1272769c2900e83615ac02e1_JaffaCakes118.sys windows:5 windows x86 arch:x86
deb3c8c3e682e921732d36ddcdca8391
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
wcscat
wcscpy
MmIsAddressValid
ZwClose
ZwUnmapViewOfSection
PsGetVersion
_wcslwr
wcsncpy
KeDelayExecutionThread
ZwCreateKey
swprintf
ZwCreateFile
ZwEnumerateKey
ZwSetValueKey
ZwOpenKey
IoRegisterDriverReinitialization
RtlAnsiStringToUnicodeString
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 628B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ