XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Static task
static1
General
-
Target
1ac161393832d00f861a243103ee84f0_JaffaCakes118
-
Size
6KB
-
MD5
1ac161393832d00f861a243103ee84f0
-
SHA1
af3a87e95fc5f8ff6f1e1bdb6021ab04c282c3d5
-
SHA256
3e3f6da3ea3b1cd96dfba4a3fdb296bf9423f1948e1f53f7f67a515a9d8f6bdd
-
SHA512
edec13291e50e01015fa3ec9a5491345740d665389a563126a147ef4e8d607a09747a47208f18ff8e0abfa8e2ed6af152d0c82ff35a26e3b06d690817644629c
-
SSDEEP
96:w2ni7MwvFAv6FzwS4X6P1If9nnOFF8JgXh+SMCT+l3SBpAKtMz5X:3aMF6F8bf9nuikhdiZKKX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ac161393832d00f861a243103ee84f0_JaffaCakes118
Files
-
1ac161393832d00f861a243103ee84f0_JaffaCakes118.sys windows:5 windows x86 arch:x86
bb987107c12db4043bce620809ac5191
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwCreateJobObject
ObOpenObjectByPointer
_except_handler3
IoCreateFile
RtlInitUnicodeString
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
IofCallDriver
RtlAssert
KeGetCurrentThread
KeInitializeEvent
ObfDereferenceObject
IoAllocateIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
MmUnmapViewOfSection
ZwClose
ZwSetValueKey
wcslen
ZwOpenKey
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
ZwCreateKey
RtlInitAnsiString
IoCreateSymbolicLink
DbgPrint
IoCreateDevice
KeDetachProcess
ZwTerminateProcess
KeAttachProcess
IofCompleteRequest
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
IoDeleteDevice
IoDeleteSymbolicLink
PsLookupProcessByProcessId
hal
KeGetCurrentIrql
Sections
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ