Static task
static1
General
-
Target
01e8f04afbdc50a97505fab0f9340fd3_JaffaCakes118
-
Size
24KB
-
MD5
01e8f04afbdc50a97505fab0f9340fd3
-
SHA1
b2a83f15282051a65265cfb52df7493595a0e531
-
SHA256
c1be8fbd1c8c6e88190a6a019b1cb3d83a502500de2b48ddb5998c06a32f4f62
-
SHA512
77efba8882c8fb2fe802ddc32a14faa70581e8120da8cc19c662dda8d2b44989034532afd61209afa977ab5dbab8e04ef898253c5708097458ead95b2b8a8c27
-
SSDEEP
384:fKQW8cup21Gyh09CVlmLvMWjPRGkltfcMkQsYtlp0IKstJU26c3lTyOvR4Ot60qO:fZWbLB9lm7McZrjKiecVTyKt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01e8f04afbdc50a97505fab0f9340fd3_JaffaCakes118
Files
-
01e8f04afbdc50a97505fab0f9340fd3_JaffaCakes118.sys windows:5 windows x86 arch:x86
79976e005fcee865178bc48076ed7c9f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeDelayExecutionThread
ZwClose
ZwCreateKey
wcslen
swprintf
RtlInitUnicodeString
wcscat
wcscpy
MmIsAddressValid
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
strncmp
IoGetCurrentProcess
_wcsnicmp
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlAnsiStringToUnicodeString
ZwUnmapViewOfSection
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwCreateFile
IoRegisterDriverReinitialization
ZwEnumerateKey
ZwSetValueKey
ZwOpenKey
PsGetVersion
_wcslwr
wcsncpy
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ