Static task
static1
General
-
Target
06b061aa762b23000eba7c3e7de55d1d_JaffaCakes118
-
Size
23KB
-
MD5
06b061aa762b23000eba7c3e7de55d1d
-
SHA1
2a4cda880f06f9bcd8e4b0b371165e270603074e
-
SHA256
b6a18554990d8e3fedc4383437c4a4ead08c6d77e8a7bb9a303cc83fd4a3de3c
-
SHA512
9d77e08c9ff1c7dc2bfc15dedff61fa5576e4e470d82942c1d65af180f0dc2380ea80bc04364c11db80e6777e37cee56457880634ab772d36f30a43033c55b91
-
SSDEEP
384:r4JXlw3hkw1wR4i+FweEzmwCMA4rFEV6GhKOS7kfb/OHWceG6GrKX6/mBX:r4bw3hkwg4HFweEzm8A4r6V1hKOyUbme
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06b061aa762b23000eba7c3e7de55d1d_JaffaCakes118
Files
-
06b061aa762b23000eba7c3e7de55d1d_JaffaCakes118.sys windows:4 windows x86 arch:x86
99d6e7401a9d4062c7dbc9b7f09a7524
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ObfDereferenceObject
ObQueryNameString
_wcsnicmp
wcslen
_strnicmp
swprintf
RtlInitUnicodeString
ZwUnmapViewOfSection
wcscpy
wcscat
RtlCopyUnicodeString
KeServiceDescriptorTable
strncpy
IoGetCurrentProcess
_except_handler3
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ExFreePool
ExAllocatePoolWithTag
_stricmp
MmGetSystemRoutineAddress
strncmp
RtlCompareUnicodeString
ExGetPreviousMode
IofCompleteRequest
MmIsAddressValid
_snprintf
ZwQuerySystemInformation
RtlAnsiStringToUnicodeString
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 756B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 928B - Virtual size: 910B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ