Static task
static1
General
-
Target
3891ae0d171997d2414c89d104d58b40_JaffaCakes118
-
Size
40KB
-
MD5
3891ae0d171997d2414c89d104d58b40
-
SHA1
8a8bf53f93fe83ab466a60c6936529dc3b24a36e
-
SHA256
5b867f053d25fb01b6cf7c94004327e2ce4668a66ca6bf72012922a44cc7d6a0
-
SHA512
bbdfa2c1b9690dc002adffc0ee8ce4e96b0c92ffcc909f72bda596398dc01b0ef5bed84ef50d042db123ee7838200714d5da07831b2809f3c906900300f66778
-
SSDEEP
768:AgKOhBPmqLXw75+vqS70FyccBOH9af9jUuLbKavMDUPofuTo:SsVmq7OsvIg7sHcl9LbH0co
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3891ae0d171997d2414c89d104d58b40_JaffaCakes118
Files
-
3891ae0d171997d2414c89d104d58b40_JaffaCakes118.sys windows:4 windows x86 arch:x86
e6fcbe39117fd0e469f78def5ba477b2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcsncpy
MmIsAddressValid
IoGetCurrentProcess
PsGetVersion
ZwQueryValueKey
RtlInitUnicodeString
_stricmp
swprintf
wcsstr
_wcslwr
_wcsicmp
RtlCopyUnicodeString
ExFreePool
ExAllocatePoolWithTag
ZwClose
ObfDereferenceObject
KeQuerySystemTime
strncmp
strncpy
PsLookupProcessByProcessId
KeDelayExecutionThread
ZwSetValueKey
ZwCreateKey
wcslen
wcsrchr
RtlCompareUnicodeString
_snwprintf
wcschr
ZwOpenKey
_except_handler3
RtlAnsiStringToUnicodeString
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeQueryTimeIncrement
ZwDeleteKey
wcscat
wcscpy
_wcsnicmp
_snprintf
ZwCreateFile
ObReferenceObjectByHandle
IoDeviceObjectType
IofCompleteRequest
MmGetSystemRoutineAddress
ZwSetInformationFile
IoRegisterDriverReinitialization
PsCreateSystemThread
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 61B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ