Static task
static1
General
-
Target
0880b0332cf1067b7963caf1045a5ab0_JaffaCakes118
-
Size
40KB
-
MD5
0880b0332cf1067b7963caf1045a5ab0
-
SHA1
8bed844daedd6dee68323ce78f805e0c66060ae2
-
SHA256
d4aea54f54b3c8fb7d3affcd70c46b47f40ebc546adc111e73b450b877cc52a0
-
SHA512
1a58359362313563e982e00bb707d37e54a89b87335809db9e8fd4dae59c5ddf13c9a8a5d4fac5e5ae9ba22c6485dc6fd3d54ff0bbc2b9047970212b481db90b
-
SSDEEP
768:/Q1qnPxwahLHPHONfRc8McXu7phMXgsp0priX5vC3X9o+6MxsYW7G:eqJwaFHPofRc8Mwu7MXgsp0pmX5vCCYY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0880b0332cf1067b7963caf1045a5ab0_JaffaCakes118
Files
-
0880b0332cf1067b7963caf1045a5ab0_JaffaCakes118.sys windows:4 windows x86 arch:x86
07fe977f750eb24481d5b5e3521c5edf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmIsAddressValid
RtlInitUnicodeString
ZwClose
PsCreateSystemThread
ObReferenceObjectByHandle
strncpy
PsLookupProcessByProcessId
_stricmp
_wcsnicmp
wcslen
ZwCreateKey
swprintf
wcsncpy
wcsrchr
RtlCompareUnicodeString
ZwSetValueKey
ZwDeleteKey
ZwOpenKey
ObfDereferenceObject
ExFreePool
ExAllocatePoolWithTag
ZwQueryValueKey
_except_handler3
ZwSetInformationFile
ZwCreateFile
wcscpy
MmGetSystemRoutineAddress
KeTickCount
KeQueryTimeIncrement
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
strncmp
IoRegisterDriverReinitialization
wcsstr
_wcslwr
_snwprintf
wcschr
IoGetCurrentProcess
PsGetVersion
KeDelayExecutionThread
KeQuerySystemTime
RtlCopyUnicodeString
IofCompleteRequest
PsSetCreateProcessNotifyRoutine
wcscat
_wcsicmp
_snprintf
RtlAnsiStringToUnicodeString
IoDeviceObjectType
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 71B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ