Static task
static1
General
-
Target
19bb709b57a13c5a72333591f6b0dd92_JaffaCakes118
-
Size
28KB
-
MD5
19bb709b57a13c5a72333591f6b0dd92
-
SHA1
fac0fb7d544c2511a34f31b6bbe40f4f4a5fac63
-
SHA256
372c357c86d3ac5443e6814f7155326766e8a23533e87dc1e2354d038b241f09
-
SHA512
c411fe36cd0264dc658bc2af661f724e98d966d01bf2e2967e68f4d971c0d93334b642963cb6b9e549aee57342ac41468a55e470f9c2b48d0dfe3b73dfb72d37
-
SSDEEP
768:Ilknp/ZG9oI9zUvs1qEa8J4NQBSHW2cWJ652t2/2N:1p/k9z11qEaOKoS7I2t2/2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19bb709b57a13c5a72333591f6b0dd92_JaffaCakes118
Files
-
19bb709b57a13c5a72333591f6b0dd92_JaffaCakes118.sys windows:4 windows x86 arch:x86
144ec5ef38067bb440a77a540b2e183b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcscat
wcscpy
_itow
ObfDereferenceObject
swprintf
strncpy
RtlInitUnicodeString
ExFreePool
_snprintf
ExAllocatePoolWithTag
MmGetSystemRoutineAddress
strncmp
_stricmp
wcslen
ZwClose
ZwOpenKey
RtlCopyUnicodeString
RtlAnsiStringToUnicodeString
_wcsnicmp
_strnicmp
IofCompleteRequest
_except_handler3
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 918B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ