Static task
static1
General
-
Target
32624de64ff5db6c345be7d8e337e852_JaffaCakes118
-
Size
28KB
-
MD5
32624de64ff5db6c345be7d8e337e852
-
SHA1
546b05d3a060c1a707decd0fa9e64778d4d8ec46
-
SHA256
d26a7cb2f32a0da83ad2d3cdea7f31f2a3ce02879cd956dc5890024779a5efd0
-
SHA512
3c523e25f55195d112a900c9598b7bcaafe7e2b4243ac35da4e9a113b05fe9f81c075b0faf0c3c644f8cbb28b87248e87343a7a8a2490e41d88ac117d0eb713e
-
SSDEEP
384:5ED0s68fg0FXzl6lUNqGsFAjtjP1m6PGbhb53nr9Tl93uOO6qnmTJB:5EDBfgGXzsGIWtm6ubhbZpTl9/OZOD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 32624de64ff5db6c345be7d8e337e852_JaffaCakes118
Files
-
32624de64ff5db6c345be7d8e337e852_JaffaCakes118.sys windows:5 windows x86 arch:x86
d221a450974d42dea98fcdabaa03238d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExAllocatePoolWithTag
NtUnlockFile
RtlInitUnicodeString
IoPageRead
MmGetSystemRoutineAddress
ExFreePoolWithTag
IoAllocateIrp
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 256B - Virtual size: 224B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 30B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ