Static task
static1
General
-
Target
30c7ab6cef69440e0ca0b90d3608ac39_JaffaCakes118
-
Size
21KB
-
MD5
30c7ab6cef69440e0ca0b90d3608ac39
-
SHA1
8784995f1ce9d40b83e50b3d325568e2b21e1b04
-
SHA256
bf373d3d42cf89981575c30f276ee6082721619c01b79eaab234b785963e3937
-
SHA512
7497ec006b54af4d93582a33f7a228d501bd850d8eec0e90b10ad7d77687b9a70fa7dfe54f4e2c22b9f0044c62712807b12a66150b67057f94f3239e38d4f860
-
SSDEEP
96:luh2FnaKSpSkfUvF4ELUhS3sQCUs+DZ770e0K6aHrrs+0VZTogGY:e2FnaXShvebYZf08BCVWY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30c7ab6cef69440e0ca0b90d3608ac39_JaffaCakes118
Files
-
30c7ab6cef69440e0ca0b90d3608ac39_JaffaCakes118.sys windows:5 windows x86 arch:x86
b0eac6fed43c6764c3db930b6167ef4d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
MmIsAddressValid
RtlFreeAnsiString
_strupr
RtlUnicodeStringToAnsiString
strncmp
IoGetCurrentProcess
strrchr
PsGetCurrentThreadId
PsGetCurrentProcessId
strstr
PsLookupProcessByProcessId
strncpy
RtlInitUnicodeString
KeServiceDescriptorTable
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ZwReadFile
ZwClose
ZwCreateFile
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
DbgPrint
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 224B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 96B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 768B - Virtual size: 748B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 480B - Virtual size: 454B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ