Static task
static1
General
-
Target
2f38dbaba273b815d0b29509b58e75d1_JaffaCakes118
-
Size
25KB
-
MD5
2f38dbaba273b815d0b29509b58e75d1
-
SHA1
30ecab11b5c116d950d344d70006f1aff9828b4e
-
SHA256
94eb6f49bce4087d3bc7f988966f187b80e2a4bdae671cae52a27135f82f9606
-
SHA512
d982366387752166c25af86d20c305535ebab7ad41b536909d85be53acc7ce77e04c1c5a33cf3279807aded021fad83f08384ea88e46b2cf66ce26f750c75379
-
SSDEEP
384:uSNZoSoDEu/nF/fmwhAq37lb6DEBgx1K1gOpHgaaL:uUoSoDEut/fNDL94ugXQgOpHgj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f38dbaba273b815d0b29509b58e75d1_JaffaCakes118
Files
-
2f38dbaba273b815d0b29509b58e75d1_JaffaCakes118.sys windows:4 windows x86 arch:x86
b6324afb67f0be68235993d852a048b1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_wcslwr
wcsncpy
PsGetVersion
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwMapViewOfSection
ZwClose
ZwCreateSection
ZwOpenFile
RtlInitUnicodeString
RtlFreeUnicodeString
KeDelayExecutionThread
wcslen
ZwCreateKey
swprintf
wcscat
wcscpy
ZwCreateFile
IoRegisterDriverReinitialization
MmIsAddressValid
strncmp
IoGetCurrentProcess
_wcsnicmp
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwUnmapViewOfSection
ZwEnumerateKey
ZwSetValueKey
ZwOpenKey
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
KeInitializeTimer
IofCompleteRequest
RtlAnsiStringToUnicodeString
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 992B - Virtual size: 986B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 672B - Virtual size: 652B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ