Static task
static1
General
-
Target
1c315c5b674ebab96986bc8a2a138180_JaffaCakes118
-
Size
40KB
-
MD5
1c315c5b674ebab96986bc8a2a138180
-
SHA1
814a3737c846eacf84dc1999149363be795d0da6
-
SHA256
599eac61f6d2a3a258634a316502e0dbb7fb413e0e4d6890ba1082435c06f5b6
-
SHA512
8c9eb7049736bb0d019edb68e725e49cf3e645a2501df18f0351d9e5c097d8b5afcdbcf953835455aace506845a5ebd8739433257a54adfbda5134851bef9df8
-
SSDEEP
768:NNfpr4eW0J9QV4TOFsey46ocBmbYuh3Bt55mYn:3BrQ0Jwmgf61u955Tn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c315c5b674ebab96986bc8a2a138180_JaffaCakes118
Files
-
1c315c5b674ebab96986bc8a2a138180_JaffaCakes118.sys windows:4 windows x86 arch:x86
0c187e7f3ca180f970b8019c849123f3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncpy
PsLookupProcessByProcessId
_stricmp
ZwClose
swprintf
ZwOpenKey
strncmp
PsCreateSystemThread
KeQuerySystemTime
RtlCompareUnicodeString
RtlInitUnicodeString
_wcsnicmp
wcslen
IoGetCurrentProcess
ZwSetValueKey
ZwQueryValueKey
_except_handler3
KeDelayExecutionThread
_snwprintf
wcsncpy
wcschr
MmGetSystemRoutineAddress
MmIsAddressValid
RtlAnsiStringToUnicodeString
_wcsicmp
IoDeviceObjectType
RtlCopyUnicodeString
PsGetVersion
wcscat
wcscpy
ObfDereferenceObject
ObReferenceObjectByHandle
wcsrchr
ZwDeleteKey
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwCreateKey
ExAllocatePoolWithTag
ExFreePool
KeTickCount
KeQueryTimeIncrement
ZwSetInformationFile
ZwCreateFile
wcsstr
_wcslwr
PsSetCreateProcessNotifyRoutine
IofCompleteRequest
_snprintf
IoRegisterDriverReinitialization
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 86B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ