Static task
static1
General
-
Target
03fdae5a8960a5d5911599dffa2e9aee_JaffaCakes118
-
Size
50KB
-
MD5
03fdae5a8960a5d5911599dffa2e9aee
-
SHA1
fe50c7cd9187c23b2f7229f43fd69c36cb13e67f
-
SHA256
85bf4518c054d1bbacce72e85118a8cdf5b2031cdf84d598ec79173f8aab3ead
-
SHA512
c0e44d70bd34df693b25eae83c699aa66a9d6081910640a1e3ef6ae09101f1c9f5d1bb371f58826ec4342f42c5b1ea5cd8b60fb474ed584a86b33d7db9d825a0
-
SSDEEP
1536:xcXIJkMBKyut1wYtSgt7+hApXt05H/1RPlWqWc/35pQ/9Zjb7rZsQGhHD6qZ8ujk:YH5G
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03fdae5a8960a5d5911599dffa2e9aee_JaffaCakes118
Files
-
03fdae5a8960a5d5911599dffa2e9aee_JaffaCakes118.sys windows:4 windows x86 arch:x86
016df1a6ddfa60709a37ba2bd95197a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwCreateFile
ZwSetValueKey
ZwClose
ZwOpenKey
ZwEnumerateKey
RtlInitUnicodeString
wcscat
wcscpy
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
RtlAnsiStringToUnicodeString
PsTerminateSystemThread
_stricmp
strncpy
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
swprintf
MmIsAddressValid
ZwUnmapViewOfSection
ZwCreateKey
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
MmGetSystemRoutineAddress
PsGetVersion
_wcslwr
wcsncpy
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 224B - Virtual size: 193B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 736B - Virtual size: 730B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 928B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 736B - Virtual size: 730B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ