Static task
static1
General
-
Target
397174416550dca8fffa1221a14198bd_JaffaCakes118
-
Size
25KB
-
MD5
397174416550dca8fffa1221a14198bd
-
SHA1
3f7c16945ed8c41dbb047813274c1e7776e0c5d1
-
SHA256
b4aef8977afabff369ef7195aae59e26a78ce4dcc2243deae99c0fb9076e9bc2
-
SHA512
bd71261961f03f19859fb60a24785fbd3846a1f3c664a0b411777453301afaeab184af0b7077cc83068b6f2de39c40fb483558e949021531b9c665776ce6fae9
-
SSDEEP
384:O/UFHtzyAZet/dtX+Ik9qXtppVuC+UDZ4QSRQ9PEjuZ90WoW9aqv:O/UFHJ4tFsIVXqQSUznQq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 397174416550dca8fffa1221a14198bd_JaffaCakes118
Files
-
397174416550dca8fffa1221a14198bd_JaffaCakes118.sys windows:4 windows x86 arch:x86
12f41e77661c4e3d4679540184b7926e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
ZwClose
ZwQueryValueKey
ZwOpenKey
_wcsnicmp
wcslen
ObfDereferenceObject
IofCompleteRequest
ExFreePool
_snprintf
ExAllocatePoolWithTag
swprintf
wcscpy
_except_handler3
strncpy
RtlCompareUnicodeString
ExGetPreviousMode
_strnicmp
MmIsAddressValid
strncmp
MmGetSystemRoutineAddress
_stricmp
RtlCopyUnicodeString
RtlAnsiStringToUnicodeString
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 916B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ