Static task
static1
General
-
Target
0d9b3bdc320b47d9497f78bd1018abac_JaffaCakes118
-
Size
22KB
-
MD5
0d9b3bdc320b47d9497f78bd1018abac
-
SHA1
023ad72df3667d48ee81436afd29b13bc843e8c5
-
SHA256
a90904a6c8a69f3e027421a420093acf0be6fb9dfe61a1a405925284fb71f937
-
SHA512
03ed676be8d446f58bf5162ef7dddf6bfc38f9578a2301c70570fa5e1d9e47a3fa495da3d52c44ce08ba3e802880c935619a329622f36c49217a243f8b4ea7df
-
SSDEEP
384:QWwYH3Y+hb31ewo6sfaoFjtqcSLewg9ZVWyAJs2wbxS8KzViUX4J08TNq:QF63RhBewo9Csjtq76wSZQs2wbxSNz74
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d9b3bdc320b47d9497f78bd1018abac_JaffaCakes118
Files
-
0d9b3bdc320b47d9497f78bd1018abac_JaffaCakes118.sys windows:5 windows x86 arch:x86
7ad83d02875f3285cde4463f49131c15
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
RtlInitUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
swprintf
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
ZwCreateKey
wcscat
wcscpy
MmIsAddressValid
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwUnmapViewOfSection
ZwCreateFile
IoRegisterDriverReinitialization
PsGetVersion
_wcslwr
wcsncpy
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
RtlAnsiStringToUnicodeString
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 608B - Virtual size: 582B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ