Static task
static1
General
-
Target
19d9871274ee48b2c0ed7c1c7ee27ada_JaffaCakes118
-
Size
106KB
-
MD5
19d9871274ee48b2c0ed7c1c7ee27ada
-
SHA1
2aebd0709f3cecb0313e940e221337a4c7c61860
-
SHA256
28d65af728710a6038eb5fc878184cce07fd25701345dc39924ccebf750f3b82
-
SHA512
51c126800b1791229c784bfbbf789dbdc7d3bd8aa2ce6c7b567e6b2443cedec35d35c3e0a21969886ad4467710f7bca6f8b7083c4e4823314d575dee7d1ca062
-
SSDEEP
1536:o/agariqse69K1Am5yFIYI5Pgq3QVrXJK6J5PYHipqrSCx/T9rx1EXY8pXo8Xiu:QaChaLF5Pr3IrIA5Pyip50nGY8pR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19d9871274ee48b2c0ed7c1c7ee27ada_JaffaCakes118
Files
-
19d9871274ee48b2c0ed7c1c7ee27ada_JaffaCakes118.sys windows:4 windows x86 arch:x86
3f82fbc608bef40ca851b7d291adefe9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strlen
ZwClose
ZwWriteFile
ZwCreateFile
RtlInitUnicodeString
strncmp
PsGetProcessImageFileName
PsLookupProcessByProcessId
ZwSetValueKey
ZwCreateKey
memset
ExAllocatePoolWithTag
memcpy
ExFreePoolWithTag
ObQueryNameString
ObfDereferenceObject
ObReferenceObjectByHandle
IoGetCurrentProcess
strncpy
IoGetRequestorProcess
_strnicmp
MmIsAddressValid
ZwOpenFile
IofCompleteRequest
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 608B - Virtual size: 586B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 448B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ