Static task
static1
General
-
Target
1b0f7557da6a1d7af4d306616f6b1905_JaffaCakes118
-
Size
16KB
-
MD5
1b0f7557da6a1d7af4d306616f6b1905
-
SHA1
67942849ae3ab489d9deb5bfdfc3126287c0b8c3
-
SHA256
d06a583b463839c8a8cade152f37ea0f9187a77ce916d64f0407101f2d76d434
-
SHA512
792025f7a6d8f630bc757973b4924f7aca5046eb2e3dc7503c487470e43ac4c6d8c7e6308e0918657e08a38bac661df50cc5a25b16d88e4788232e32ab7a51c8
-
SSDEEP
384:A8iG3B36Ga0pMwXGRoYmueywCObv0scJkOHL82npJy:b6GfWt0bv0JqOr82np4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b0f7557da6a1d7af4d306616f6b1905_JaffaCakes118
Files
-
1b0f7557da6a1d7af4d306616f6b1905_JaffaCakes118.sys windows:5 windows x86 arch:x86
cfd699d0ba646297b082df8082549e2c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memcpy
IoDeleteSymbolicLink
RtlInitUnicodeString
IoDeleteDevice
MmGetSystemRoutineAddress
PsTerminateSystemThread
IofCompleteRequest
PsGetVersion
KeServiceDescriptorTable
ObfReferenceObject
IoCreateSymbolicLink
ObfDereferenceObject
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 396B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 172B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ