Static task
static1
General
-
Target
0065ceca54a02e163574847db9726c87_JaffaCakes118
-
Size
23KB
-
MD5
0065ceca54a02e163574847db9726c87
-
SHA1
4ae222b1d69426e17759b933a5b1d266dca0da22
-
SHA256
4c02fcd739a7ea348ef4fd54f236358c6ed29acd9d97453ef449ba88bb682e77
-
SHA512
b6f6f6d2755e6da2479cd424cf8d064cc7ee16afbb05b569ee8ecfc726a48477441c19f6adef025f87ef52d1baf07bf25fb37205d6f5e81d72abf68d41a120b8
-
SSDEEP
384:VTqvDg1M+uieqHWeBcwLZ/XObN1uDA7XGTxs14Vm2bYPIVDlShdThvYLdhm:VTEDg1luie9YZ/XObN1uUzGTK4VDbYAt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0065ceca54a02e163574847db9726c87_JaffaCakes118
Files
-
0065ceca54a02e163574847db9726c87_JaffaCakes118.sys windows:5 windows x86 arch:x86
0ea54821f07358be2c2edbbff6808a99
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
PsGetVersion
_wcslwr
wcsncpy
ZwCreateFile
ZwSetValueKey
ZwClose
ZwOpenKey
ZwEnumerateKey
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlInitUnicodeString
MmIsAddressValid
ZwUnmapViewOfSection
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
RtlAnsiStringToUnicodeString
IoRegisterDriverReinitialization
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwCreateKey
wcscat
wcscpy
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 576B - Virtual size: 574B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ