Static task
static1
General
-
Target
3c678ae66650b62b2bc5cf5d92bd1c1d_JaffaCakes118
-
Size
42KB
-
MD5
3c678ae66650b62b2bc5cf5d92bd1c1d
-
SHA1
5dcf7e7e91c7826ceb4c8ba1f0258f99ff51989b
-
SHA256
917e2b4ab5cc13b1e77047fc7b0ea5a2dbbb36e30cdf1b4b938d315bb583b491
-
SHA512
f7516116380331e4992229c41f88f736a2f93c517e01e5b0b60d9399d2ba0e537f8b051f3256df4edab3e9f2513badf3aa83d41fe67e0a82a8c61442267b76ce
-
SSDEEP
384:lEVK/EL2pOarc8c4QJYE5DZ98WZX+dc/TC+:lEVgppOarc8c4CLZ93ZX+dc/TN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c678ae66650b62b2bc5cf5d92bd1c1d_JaffaCakes118
Files
-
3c678ae66650b62b2bc5cf5d92bd1c1d_JaffaCakes118.sys windows:4 windows x86 arch:x86
0a2560cdc76534d449b2a2b93d5c6a4c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KiIpiServiceRoutine
LdrFindResource_U
ZwReadFile
ZwAllocateVirtualMemory
ZwQuerySection
wcslen
RtlRaiseException
KeInitializeMutex
ObGetObjectSecurity
ZwQueryEaFile
RtlUpcaseUnicodeToMultiByteN
FsRtlAddMcbEntry
RtlTraceDatabaseEnumerate
MmRemovePhysicalMemory
KeLeaveCriticalRegion
RtlAppendUnicodeToString
KeRaiseUserException
ExAllocatePoolWithQuota
IoCheckDesiredAccess
ZwPulseEvent
RtlTraceDatabaseAdd
RtlUlonglongByteSwap
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 736B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 128B - Virtual size: 128B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ