Static task
static1
General
-
Target
0230ed31e29a6579eb9ddb228c02a051_JaffaCakes118
-
Size
40KB
-
MD5
0230ed31e29a6579eb9ddb228c02a051
-
SHA1
03e7818c0c572df7d30f912075de25a78d7ba2f8
-
SHA256
af414c8f5c6cc00dcf6bef33e97520a24f64dbcb00387d1bfebee1520b67f6fa
-
SHA512
f0bd819ed0b0d4895f1a389c7f0cccc4919c41ba2149bfbfbd4843aa422da0c75f810dbfd8b907347792e387aa172a1b1b3d5a48aed005c8ec54dfd6d1a55da0
-
SSDEEP
768:/swFsCuJ1VQwJEqjmichG3OHw72WK0FFzjrj7tZJkDCu2rwJ7A:/smsVmwGqa0+Q7R/pbxZKS0J7A
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0230ed31e29a6579eb9ddb228c02a051_JaffaCakes118
Files
-
0230ed31e29a6579eb9ddb228c02a051_JaffaCakes118.sys windows:4 windows x86 arch:x86
6dc3c4ed472201dcb9cdaffee618507b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
swprintf
ZwOpenKey
RtlInitUnicodeString
RtlCompareUnicodeString
ZwQueryValueKey
KeDelayExecutionThread
KeQuerySystemTime
MmGetSystemRoutineAddress
ZwSetValueKey
_except_handler3
IoRegisterDriverReinitialization
wcslen
ZwCreateKey
wcsncpy
wcsrchr
_wcsicmp
PsSetCreateProcessNotifyRoutine
RtlAnsiStringToUnicodeString
_wcsnicmp
ZwDeleteKey
wcscat
wcscpy
PsCreateSystemThread
_stricmp
wcsstr
_wcslwr
MmIsAddressValid
IoGetCurrentProcess
PsGetVersion
ObfDereferenceObject
ObReferenceObjectByHandle
ZwCreateFile
RtlCopyUnicodeString
IofCompleteRequest
ExFreePool
_snprintf
ExAllocatePoolWithTag
_snwprintf
wcschr
strncpy
PsLookupProcessByProcessId
strncmp
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeQueryTimeIncrement
ZwSetInformationFile
IoDeviceObjectType
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 76B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ