Static task
static1
General
-
Target
2d64dbaf4fbc7cce5bdb39688fd861aa_JaffaCakes118
-
Size
20KB
-
MD5
2d64dbaf4fbc7cce5bdb39688fd861aa
-
SHA1
db2144066f554ef9e7ed90604e66ae7f1d3e00b0
-
SHA256
44e789ee3e273f546175f7149dec1a78a5d99be2015bf4e3366872273507bdd4
-
SHA512
21c3f87dda1666be5516337f0b1d8a5a30322ef366eafa29aa7beda85daae4ff027577ef67630d6ba6c7a3045f2bf0a438855658ac63dd32f45920e8e0785426
-
SSDEEP
384:WOqjFBhWV/moS9tmlCujeJBAjMHsIpiKnE4T7pYF4u3UVaDwBt3oZSbMtGPSxIOW:WI/ml9t7sIpiKE4T7pYF4u3UVaDwBt3o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d64dbaf4fbc7cce5bdb39688fd861aa_JaffaCakes118
Files
-
2d64dbaf4fbc7cce5bdb39688fd861aa_JaffaCakes118.sys windows:4 windows x86 arch:x86
e389c5c20e5ecfd886f5b8d988955969
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoGetCurrentProcess
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
_wcsnicmp
wcslen
strncmp
_except_handler3
KeServiceDescriptorTable
ZwSetValueKey
PsGetVersion
ZwClose
PsCreateSystemThread
strncpy
PsLookupProcessByProcessId
_stricmp
ExFreePool
wcscat
wcscpy
_snwprintf
ZwEnumerateKey
ExAllocatePoolWithTag
ZwOpenKey
RtlInitUnicodeString
strstr
ZwQueryValueKey
ZwCreateKey
ZwCreateFile
IofCompleteRequest
MmGetSystemRoutineAddress
PsSetCreateProcessNotifyRoutine
RtlCompareUnicodeString
ExGetPreviousMode
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwWriteFile
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 902B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ