Static task
static1
General
-
Target
060b6b75161c892de6d12471b92d38ef_JaffaCakes118
-
Size
22KB
-
MD5
060b6b75161c892de6d12471b92d38ef
-
SHA1
3eb6e8414a4034a2b7f3a2e445cd3c0864f3c53f
-
SHA256
0e4678daa5af2866796a19ae16ace51ff58edee3b7a899c1ebbab04f564858c7
-
SHA512
a63c87d5bf4c1358f2f9d0154e89f11822340354e765da14376005298261b6702859ef54ba335333332bc7232b8e606b11dbbf9890cdc86618c60596a9281625
-
SSDEEP
384:DkQCQ64JnuDWOz+JnP6r55B3SRcKAovqGECQY5AhUKhiHlGQU:YpAJ5SFD4D/YeAhZQU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 060b6b75161c892de6d12471b92d38ef_JaffaCakes118
Files
-
060b6b75161c892de6d12471b92d38ef_JaffaCakes118.sys windows:5 windows x86 arch:x86
c8740895cf5740765b78862970c6a9f9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
KeDelayExecutionThread
ZwClose
ZwCreateKey
swprintf
RtlInitUnicodeString
wcscat
wcscpy
MmIsAddressValid
ZwCreateFile
IoRegisterDriverReinitialization
RtlAnsiStringToUnicodeString
ZwUnmapViewOfSection
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
PsGetVersion
_wcslwr
wcsncpy
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 608B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ