Static task
static1
General
-
Target
1ae322e571749626c048b2f35ca2ad59_JaffaCakes118
-
Size
18KB
-
MD5
1ae322e571749626c048b2f35ca2ad59
-
SHA1
a02c8adc2ce04deed9683af078125abbbca4c7ca
-
SHA256
1ac0224c09c4397fa2c09a405422c19a0374e50872d3e3a6e7a1798a28ce3812
-
SHA512
ac3338538f7fb902f4ad5a5099a63811ee5096d8cdf2e93d2f855b2d0c7c969029dc00ca1d186c09a822b3d904460a72f0d63e72d7c86cfaa18e614ac61e1bb1
-
SSDEEP
384:OTd+tu6pzAtYCh5mbzIBfF196F3AsN7qyWuv8S3:w+tuksh5g2fNjs1qypH3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ae322e571749626c048b2f35ca2ad59_JaffaCakes118
Files
-
1ae322e571749626c048b2f35ca2ad59_JaffaCakes118.sys windows:4 windows x86 arch:x86
d2be32502f45d8d28b224a17d806bb51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoDeleteSymbolicLink
RtlAnsiStringToUnicodeString
RtlInitAnsiString
KeWaitForSingleObject
IofCallDriver
IoBuildSynchronousFsdRequest
KeInitializeEvent
RtlFreeUnicodeString
_except_handler3
ObfDereferenceObject
IoGetDeviceObjectPointer
IofCompleteRequest
MmGetSystemRoutineAddress
RtlEqualUnicodeString
IoCreateSymbolicLink
IoCreateDevice
IoDeleteDevice
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 544B - Virtual size: 524B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 416B - Virtual size: 396B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ