Static task
static1
General
-
Target
2359a141c1cf0ef420e64bb654725c17_JaffaCakes118
-
Size
67KB
-
MD5
2359a141c1cf0ef420e64bb654725c17
-
SHA1
df1ca39846435e013b252724845b885154da7cb0
-
SHA256
94a5c3eaf98acd4cd110c83c23fb7f5911f3e011dce946a7c49ea077a3be46f1
-
SHA512
db9808900f3965d7bd369523cecea0bbe29bd4570fad42c4ae594ff4fef42008020a321dff04fc64bf5c4040e503737dcf1f2c110935c91d65aa051c8b731315
-
SSDEEP
1536:7n/o4bo+QUzO22RKfEfa5Ule+Fucllj0TYsfGNtWF:U4biE5vfEf8UlVFuGlj0TY0WtWF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2359a141c1cf0ef420e64bb654725c17_JaffaCakes118
Files
-
2359a141c1cf0ef420e64bb654725c17_JaffaCakes118.sys windows:4 windows x86 arch:x86
e4d5018239adc4a7d57290e9c40cebd2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExFreePoolWithTag
wcschr
_stricmp
strncpy
wcsncpy
strlen
RtlCompareMemory
RtlAnsiStringToUnicodeString
RtlInitAnsiString
RtlInitUnicodeString
memset
KeInitializeMutex
KeWaitForSingleObject
KeReleaseMutex
ZwClose
ObReferenceObjectByHandle
PsCreateSystemThread
KeQuerySystemTime
_aulldiv
RtlUnicodeStringToInteger
RtlTimeToTimeFields
_allmul
KeUnstackDetachProcess
KeStackAttachProcess
IofCompleteRequest
PoCallDriver
PoStartNextPowerIrp
IoDeleteDevice
IoAttachDeviceToDeviceStack
IoCreateDevice
ObfReferenceObject
IoGetRelatedDeviceObject
IoCreateFile
IoAttachDevice
IofCallDriver
IoGetCurrentProcess
_purecall
RtlWriteRegistryValue
RtlCreateRegistryKey
swprintf
ExAllocatePoolWithTag
RtlFreeUnicodeString
MmGetSystemRoutineAddress
strcmp
MmUnlockPages
IoFreeMdl
MmProbeAndLockPages
IoAllocateMdl
RtlCopyUnicodeString
DbgPrint
KeNumberProcessors
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
RtlQueryRegistryValues
PsGetVersion
IoRegisterShutdownNotification
KeSetEvent
KeInitializeEvent
KeGetCurrentThread
ObfDereferenceObject
RtlCompareUnicodeString
ObQueryNameString
ObReferenceObjectByName
IoDriverObjectType
IoFreeIrp
ObInsertObject
IoAllocateIrp
SeSetAccessStateGenericMapping
RtlMapGenericMask
SeCreateAccessState
ObCreateObject
IoFileObjectType
IoBuildDeviceIoControlRequest
IoCancelIrp
KeWaitForMultipleObjects
KeResetEvent
KeClearEvent
IoCreateSynchronizationEvent
KeSetPriorityThread
KeBugCheckEx
MmIsAddressValid
strchr
ZwWriteFile
ZwReadFile
RtlDeleteRegistryValue
memcpy
RtlUnwind
hal
KfRaiseIrql
KfAcquireSpinLock
KfReleaseSpinLock
KeGetCurrentIrql
KfLowerIrql
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pagecode Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ