Static task
static1
General
-
Target
045b05690c4cc03edc2de8802329b836_JaffaCakes118
-
Size
40KB
-
MD5
045b05690c4cc03edc2de8802329b836
-
SHA1
3c9b006780216bd78a6cfa9d29c39aea8c2fffd7
-
SHA256
4d59c31769c061c1d2efe37ef83a277a78bcb52b0d2a53882c3ed9a8dd7656da
-
SHA512
0ad769a830df9f113dc6c40d9db9463ab3bdc62bf4f628f43fae99e63df9d3a70ec362466fbb2b1d1927af224ed1b3ed55f169ed5f22b3685b0bead3289df55b
-
SSDEEP
768:FLXbHcJmuWzb1ArEPo/2WkiYLiltu0UT16Jd45RN8YkI0eJm5+8Bs:xbH9fzb5wuPFwQbTJ8Yk35B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 045b05690c4cc03edc2de8802329b836_JaffaCakes118
Files
-
045b05690c4cc03edc2de8802329b836_JaffaCakes118.sys windows:4 windows x86 arch:x86
87a428afbaf2b499d528e0940cb30d24
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ObfDereferenceObject
MmIsAddressValid
ObReferenceObjectByHandle
ZwOpenKey
RtlInitUnicodeString
wcsncpy
wcsrchr
ZwSetInformationFile
ZwCreateFile
wcslen
wcscpy
swprintf
ExFreePool
ExAllocatePoolWithTag
IoGetCurrentProcess
PsGetVersion
ZwQueryValueKey
ZwSetValueKey
ZwCreateKey
strncmp
wcsstr
_wcslwr
RtlAnsiStringToUnicodeString
_except_handler3
IofCompleteRequest
_wcsnicmp
PsCreateSystemThread
PsSetCreateProcessNotifyRoutine
RtlCompareUnicodeString
KeTickCount
KeQueryTimeIncrement
_stricmp
MmGetSystemRoutineAddress
KeDelayExecutionThread
KeQuerySystemTime
_snwprintf
IoDeviceObjectType
_snprintf
_wcsicmp
IoRegisterDriverReinitialization
RtlCopyUnicodeString
strncpy
PsLookupProcessByProcessId
wcschr
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
wcscat
ZwDeleteKey
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 70B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ