Static task
static1
General
-
Target
2c8449e288f852c324671b7681ecd9f7_JaffaCakes118
-
Size
9KB
-
MD5
2c8449e288f852c324671b7681ecd9f7
-
SHA1
5d0145417075551988ca09f5455e83672616aa21
-
SHA256
a2883d30e00f23c28c1b7d484f629f4a79ec14f03a9060ff0d26b21c9de75b08
-
SHA512
29cde6c76f26215b7777251fe5fa284bc38009bf799ef2e1b9d64b388c068abf970165bca9591c8cc0569c638544dbd8c4c8bf5e38e3673a2e6780cb780a043e
-
SSDEEP
192:E6h+9sVKdMcJmoEWOpC3d1MJQnm29eM8xdz92Y+kEb:1h+eYMcJmoEWiCwWnXsLxdzh+k
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c8449e288f852c324671b7681ecd9f7_JaffaCakes118
Files
-
2c8449e288f852c324671b7681ecd9f7_JaffaCakes118.sys windows:5 windows x86 arch:x86
b6073e958768afb40bb9865dc1b98243
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
IofCompleteRequest
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
ExAllocatePoolWithTag
MmSizeOfMdl
ZwQueryInformationProcess
PsGetCurrentProcessId
DbgPrint
ExGetPreviousMode
ProbeForWrite
ProbeForRead
RtlFreeAnsiString
_strlwr
strrchr
RtlUnicodeStringToAnsiString
MmIsAddressValid
_except_handler3
KeUnstackDetachProcess
ZwTerminateProcess
KeStackAttachProcess
PsLookupProcessByProcessId
PsTerminateSystemThread
ExFreePool
ZwQuerySystemInformation
ZwPulseEvent
MmGetSystemRoutineAddress
PsSetLoadImageNotifyRoutine
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 800B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 932B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 448B - Virtual size: 438B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ