Static task
static1
General
-
Target
1556bf28e906d971d577a4ba361b2a77_JaffaCakes118
-
Size
40KB
-
MD5
1556bf28e906d971d577a4ba361b2a77
-
SHA1
e0abb92606f073c207e67d858771a172a61f2be4
-
SHA256
175753338b2c57eea28d81cdb24920c7f9f466ea64836911e2643146975bfc23
-
SHA512
44a46e81cfb65aab2e34c8bd001edf7b53a639b9863094243d882b98e47698f4a4f258e6aab215614490838eba6e5a443b7179d39ba60784f7a8db923a043a8c
-
SSDEEP
768:qdNg6v6sNgv7OVhIZ+sZ5kdOgviKHTnxQCvqEFwh/JaVnr52gN/M:IN2IILWVigxVfwh/JVgV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1556bf28e906d971d577a4ba361b2a77_JaffaCakes118
Files
-
1556bf28e906d971d577a4ba361b2a77_JaffaCakes118.sys windows:4 windows x86 arch:x86
dc4828c4c83169badbe256ca48084d2e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwSetValueKey
wcslen
RtlInitUnicodeString
ZwClose
ZwCreateFile
swprintf
PsGetVersion
IoRegisterDriverReinitialization
_snwprintf
wcsncpy
wcschr
ZwQueryValueKey
ZwOpenKey
_except_handler3
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlCompareUnicodeString
ObReferenceObjectByHandle
RtlCopyUnicodeString
KeQuerySystemTime
MmIsAddressValid
IoDeviceObjectType
ExAllocatePoolWithTag
ZwDeleteKey
ExFreePool
ObfDereferenceObject
PsSetCreateProcessNotifyRoutine
_wcsnicmp
IofCompleteRequest
PsCreateSystemThread
wcsrchr
ZwCreateKey
wcscat
wcscpy
_wcsicmp
strncpy
IoGetCurrentProcess
MmGetSystemRoutineAddress
_stricmp
wcsstr
_wcslwr
ZwSetInformationFile
strncmp
KeTickCount
KeQueryTimeIncrement
PsLookupProcessByProcessId
_snprintf
KeDelayExecutionThread
RtlAnsiStringToUnicodeString
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 96B - Virtual size: 73B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ