Static task
static1
General
-
Target
3e3a9ea8f1b270b2b46465069005efdd_JaffaCakes118
-
Size
21KB
-
MD5
3e3a9ea8f1b270b2b46465069005efdd
-
SHA1
4394f8ba5e39ea2d044674baf697b10620cc20cb
-
SHA256
db8620bf820a0b69e3302e91aed3113f93185d6173ca7e586fadbd9091d94862
-
SHA512
634a46de5bfb45905437b56c632fad6388d7f55249703e45cea19170972516b30420215f779ea6b75cde369a9b0ff023b0322c5b6470d9e4aad92faf93762ef9
-
SSDEEP
384:ju9qxFT9YzsLlvT8c8GYn57ZzPLDffdXxYT0NDVfiifFS5:wqGOlKjnHznfVvFS5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e3a9ea8f1b270b2b46465069005efdd_JaffaCakes118
Files
-
3e3a9ea8f1b270b2b46465069005efdd_JaffaCakes118.sys windows:4 windows x86 arch:x86
f7905c06285378cb5e047600f5c6c81d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
CcUnpinData
towupper
RtlIntegerToUnicodeString
RtlGetSaclSecurityDescriptor
WRITE_REGISTER_ULONG
ExFreePool
DbgPrint
ZwQueryInformationProcess
ObQueryNameString
IoBuildAsynchronousFsdRequest
RtlFillMemoryUlong
RtlCustomCPToUnicodeN
PsChargePoolQuota
InterlockedIncrement
ZwSaveKey
IoGetInitialStack
ExSystemExceptionFilter
FsRtlAreNamesEqual
MmIsNonPagedSystemAddressValid
ZwDuplicateObject
RtlFindMessage
ZwQueryDirectoryFile
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ILIT Size: 1024B - Virtual size: 614B
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 485B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ