Static task
static1
General
-
Target
0ba96578064812bc223d18835acde015_JaffaCakes118
-
Size
27KB
-
MD5
0ba96578064812bc223d18835acde015
-
SHA1
e8dd3ac0f1bd4891c223924b0e320d8343404291
-
SHA256
7cc38545710df858f1431ae11d31f0e9280d0a7728e34f5d9b00ae7a39a9ab27
-
SHA512
533c912c0faa434284ca3908528b1f1e77f81fd862fb29bb82d1fb6f720e14f5cd67d78d6e744153190105de62f5b060dc05d56474d755b855b0ac4c2047d508
-
SSDEEP
768:qgdBqe1Pqm33MzsV2Q5mSfi2cmv3RDu3TwE9p+0IkY24:qUBqecmnz1mSa2cmv3MjwE9p+09
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ba96578064812bc223d18835acde015_JaffaCakes118
Files
-
0ba96578064812bc223d18835acde015_JaffaCakes118.sys windows:4 windows x86 arch:x86
66d19f4c8487b2e6841d4ba8e432d406
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
_stricmp
strncpy
ObfDereferenceObject
swprintf
RtlInitUnicodeString
wcslen
wcscat
wcscpy
_wcsnicmp
_itow
ZwClose
ZwOpenKey
_strnicmp
RtlAnsiStringToUnicodeString
RtlCopyUnicodeString
MmIsAddressValid
ExFreePool
_snprintf
ExAllocatePoolWithTag
IofCompleteRequest
MmGetSystemRoutineAddress
_except_handler3
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 864B - Virtual size: 850B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ