Static task
static1
General
-
Target
39d482f5a2c0022624c5e3b6fc6633e4_JaffaCakes118
-
Size
40KB
-
MD5
39d482f5a2c0022624c5e3b6fc6633e4
-
SHA1
8d236e7f3b6381047b0f60e785dc8b212fbee361
-
SHA256
c3872785b8587768c4aaedcffe32760275582b7eb7214230feef7bf58f8ad7f8
-
SHA512
ffb8f7018122848f5c3e2ead578ef37af56428fd0b907069976e09497f06dcd23f6d2c50df888a7cad0b1d9503082b22b01b201068709f4f07d72229863aaa50
-
SSDEEP
768:DMjUgnHqX0z+RLcBMNUuXKXRBTzoqE6VC1/B0FPY6WguZ/0gFCmS:QjbHqcRMNcRpztE6VY/B0FQ6WguZ/b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39d482f5a2c0022624c5e3b6fc6633e4_JaffaCakes118
Files
-
39d482f5a2c0022624c5e3b6fc6633e4_JaffaCakes118.sys windows:4 windows x86 arch:x86
6d097b11b6cdd6cfb696141bdf246661
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeDelayExecutionThread
KeQuerySystemTime
ZwClose
ObfDereferenceObject
MmIsAddressValid
ObReferenceObjectByHandle
ZwOpenKey
RtlInitUnicodeString
wcsncpy
wcsrchr
strncmp
IoGetCurrentProcess
_snwprintf
ExAllocatePoolWithTag
ZwDeleteKey
IoDeviceObjectType
_stricmp
swprintf
wcsstr
_wcslwr
ZwSetValueKey
PsGetVersion
RtlCopyUnicodeString
wcslen
wcschr
wcscat
wcscpy
_wcsicmp
ZwQueryValueKey
_except_handler3
PsSetCreateProcessNotifyRoutine
KeTickCount
KeQueryTimeIncrement
MmGetSystemRoutineAddress
RtlCompareUnicodeString
IoRegisterDriverReinitialization
IofCompleteRequest
RtlAnsiStringToUnicodeString
ExFreePool
_snprintf
strncpy
ZwCreateKey
PsLookupProcessByProcessId
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
PsCreateSystemThread
_wcsnicmp
ZwCreateFile
ZwSetInformationFile
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 86B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ