Static task
static1
General
-
Target
3ae29ea39a438ea0f3466a0f5d009713_JaffaCakes118
-
Size
4KB
-
MD5
3ae29ea39a438ea0f3466a0f5d009713
-
SHA1
b0f0dfd3bc6259f077e3eba9144e496a9d29771f
-
SHA256
1557b512159376b8266e55ef440904e32e468a38f48bf564b2a27da03f489ead
-
SHA512
bb73ebf384f3f214ce01ed10868319b551559e0c1bfaa61e1341d319137b56dba066c8098552c3ba720b803bd3ecab73f7d434c35f4520a3d9ea7978b9cfff25
-
SSDEEP
48:i8UCyeo4Nv0pn84cCCLkweuWjIMbvMyuEfXVp2wxQMncCCsGnLe6Rrdw/swHX9E3:Zro+Mp84+LkpzVwa9ncWGH/w/sw39mZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3ae29ea39a438ea0f3466a0f5d009713_JaffaCakes118
Files
-
3ae29ea39a438ea0f3466a0f5d009713_JaffaCakes118.sys windows:4 windows x86 arch:x86
cdab88fe925b8651fe8f34e7ff86924f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
IoGetDeviceObjectPointer
IoRegisterDriverReinitialization
ObDereferenceObject
ObReferenceObjectByHandle
ObReferenceObjectByName
ZwAccessCheckAndAuditAlarm
ZwClose
ZwOpenDirectoryObject
MmUserProbeAddress
KeServiceDescriptorTable
IoDriverObjectType
DbgPrint
IofCompleteRequest
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 544B - Virtual size: 520B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 160B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ