Static task
static1
General
-
Target
017aa1c0a94fc401aae3a05d54ac9316_JaffaCakes118
-
Size
41KB
-
MD5
017aa1c0a94fc401aae3a05d54ac9316
-
SHA1
4a65b482974ae09b162e33ccc702a4a94c14dbcb
-
SHA256
7d0b91481a5968e7f3e21124882abbb7468681f5d17b6998e02ac3eb0ec55d45
-
SHA512
9412a014ad9cc08f5d934375a2f3611ee7d2b99b0f796d95947cd73fcf7feaa0b240363c50c324d049630b082b8838e7110b9d648dc5104e9ca6a4f3b096b00a
-
SSDEEP
768:mWQWa6La+qzUTmWOAxoZ8AUbn/s9ScYTvsXIY/m434fTOnTTfI:mJsufI6CoZ8RU8cYTvsY9dfof
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 017aa1c0a94fc401aae3a05d54ac9316_JaffaCakes118
Files
-
017aa1c0a94fc401aae3a05d54ac9316_JaffaCakes118.sys windows:4 windows x86 arch:x86
0b2faceaf4f0f5a545dbb27d49b0b36a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncpy
PsLookupProcessByProcessId
_stricmp
wcsstr
_wcslwr
ZwSetValueKey
ZwClose
ObfDereferenceObject
MmIsAddressValid
ObReferenceObjectByHandle
ZwOpenKey
RtlInitUnicodeString
wcsncpy
wcsrchr
IoGetCurrentProcess
PsGetVersion
ZwQueryValueKey
ZwDeleteKey
swprintf
IoDeviceObjectType
_wcsicmp
wcslen
ZwCreateKey
strncmp
wcscat
wcscpy
KeQuerySystemTime
ZwCreateFile
PsSetCreateProcessNotifyRoutine
RtlCompareUnicodeString
IoRegisterDriverReinitialization
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwSetInformationFile
IofCompleteRequest
MmGetSystemRoutineAddress
_except_handler3
RtlAnsiStringToUnicodeString
RtlCopyUnicodeString
ExFreePool
_snprintf
ExAllocatePoolWithTag
PsCreateSystemThread
_snwprintf
KeDelayExecutionThread
wcschr
_wcsnicmp
KeTickCount
KeQueryTimeIncrement
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 68B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ