Static task
static1
General
-
Target
0d9d41736120b5d772d3c1f9e4e7592c_JaffaCakes118
-
Size
23KB
-
MD5
0d9d41736120b5d772d3c1f9e4e7592c
-
SHA1
fde8e2a1af2258b58a870afa9348a74d16afba3a
-
SHA256
68c9da2ee13f3bf8741a118c731d2ac5fb5d549c1eb5a0646a4b81e115dcd4fc
-
SHA512
aacf147a577e440b84c1321acddc9924d207cd1d780878a6f4bd58e68062dc37729b3bdfdaa6b908ad35696885acef0c23b3e34003880b93c6b75f98c01cd1cf
-
SSDEEP
384:ShijjjLBoZ06+sw2cLQQQvWBHC6wGh1XLlDMzQ2GOMUy1aYCRGvkEQ8FPUOpAojp:2ioe6gXcr+YWtLlDbNP4MPUOprd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d9d41736120b5d772d3c1f9e4e7592c_JaffaCakes118
Files
-
0d9d41736120b5d772d3c1f9e4e7592c_JaffaCakes118.sys windows:5 windows x86 arch:x86
91d734db7c08e670b98f9e3dc3178b39
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
swprintf
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
wcscat
wcscpy
ZwCreateFile
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
KeDelayExecutionThread
ZwCreateKey
wcslen
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
RtlAnsiStringToUnicodeString
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
MmIsAddressValid
PsGetVersion
_wcslwr
wcsncpy
strncmp
IoGetCurrentProcess
_wcsnicmp
IoRegisterDriverReinitialization
ZwUnmapViewOfSection
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ