Static task
static1
General
-
Target
3a7dd33c6207f4906e64e8a9d5339dfd_JaffaCakes118
-
Size
24KB
-
MD5
3a7dd33c6207f4906e64e8a9d5339dfd
-
SHA1
cf43254a6f4e494995a2636386a73abf7a8dfbea
-
SHA256
6743dc3915ca986782454d6ed32418620d39f0f5cc06b09983af46fe26044f29
-
SHA512
5db86ac3bbefff31d876a24864b2e594062134596e6efcd6f2fe39c1acc7a45001494f063b73e521d17c6e601d03c558ac79364afbaa36073c2edb22380e32cc
-
SSDEEP
384:yweZSAPGr3zImGuA6RTBBKkHh80tOI+QmAQYNxPTN0F8U6jXri:YS+ezI3uA6hIIZQYNxbt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a7dd33c6207f4906e64e8a9d5339dfd_JaffaCakes118
Files
-
3a7dd33c6207f4906e64e8a9d5339dfd_JaffaCakes118.sys windows:5 windows x86 arch:x86
b7126bad99af3309c16629baeb38ea6f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
_wcsnicmp
wcslen
ZwClose
RtlInitUnicodeString
PsTerminateSystemThread
KeDelayExecutionThread
PsCreateSystemThread
wcscat
wcscpy
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
MmIsAddressValid
ZwUnmapViewOfSection
RtlAnsiStringToUnicodeString
ZwCreateFile
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwCreateKey
swprintf
PsGetVersion
_wcslwr
wcsncpy
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
IoRegisterDriverReinitialization
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 958B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 608B - Virtual size: 606B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ