Static task
static1
General
-
Target
0da1cab0eb915afb38bd7acd3cdbc107_JaffaCakes118
-
Size
13KB
-
MD5
0da1cab0eb915afb38bd7acd3cdbc107
-
SHA1
6ed5ce871c0b577333d9e9145b9b3375ed53c84a
-
SHA256
a3ad1ba35ae3175e93177f7e6cdb3e804846e72e4dcdd24a26252e3dd3a36107
-
SHA512
66b6af1599d1ad8ea79157dbe052c82afea8f047d092b21a47964ec7063b8fc762fb0c3f47ea926dacf0527438587e3cb4ab1989d053a6141daa62c6d1639c2c
-
SSDEEP
192:Z9T+9snLzTQVIUAZmNa3ufzduxirDtNIr5+Db:jT+OEV2qa+fJuxirDjQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0da1cab0eb915afb38bd7acd3cdbc107_JaffaCakes118
Files
-
0da1cab0eb915afb38bd7acd3cdbc107_JaffaCakes118.sys windows:5 windows x86 arch:x86
0c35d32418dc3aebd156aa05bcb2eba2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
IofCompleteRequest
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
ExAllocatePoolWithTag
MmSizeOfMdl
ZwQueryInformationProcess
PsGetCurrentProcessId
ExGetPreviousMode
ProbeForWrite
ProbeForRead
_stricmp
_strupr
RtlFreeAnsiString
_strlwr
strrchr
RtlUnicodeStringToAnsiString
MmIsAddressValid
_except_handler3
KeUnstackDetachProcess
ZwTerminateProcess
KeStackAttachProcess
PsLookupProcessByProcessId
PsTerminateSystemThread
ExFreePool
ZwQuerySystemInformation
ZwPulseEvent
MmGetSystemRoutineAddress
PsSetLoadImageNotifyRoutine
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 864B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 946B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 448B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ