Static task
static1
General
-
Target
42a745a5315a643c6d7e10145c9e5096_JaffaCakes118
-
Size
27KB
-
MD5
42a745a5315a643c6d7e10145c9e5096
-
SHA1
a2cb5a34e4cb9664ecde52cea683cdd155a6669d
-
SHA256
47a8f808fd0b131a923ef7985bb0caf755a08a11996385c7bc8c4a17e85c42e2
-
SHA512
184f62b3b842a35189cf00e468aba3c1325689f6223f6f4980e1feb2dad24ad0d2458d30612d0208b68011a88c772b9e83cb8c4d18270ef9b8b5b6c130fb4c40
-
SSDEEP
768:OzWoIPhQRVPZLFcmEmDi9PZcBXvd3sjrrgRL3YrZK7zYcnKeQ:ia4slNmhl7zA8Yj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42a745a5315a643c6d7e10145c9e5096_JaffaCakes118
Files
-
42a745a5315a643c6d7e10145c9e5096_JaffaCakes118.sys windows:4 windows x86 arch:x86
de9d90be0a6c7361742cac3576a5c1ef
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncpy
IoGetCurrentProcess
KeServiceDescriptorTable
ZwClose
MmIsAddressValid
swprintf
RtlAnsiStringToUnicodeString
wcslen
RtlInitUnicodeString
IofCompleteRequest
RtlCompareUnicodeString
ExGetPreviousMode
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
wcscpy
_except_handler3
ExFreePool
_snprintf
ExAllocatePoolWithTag
ZwQuerySystemInformation
wcscat
_stricmp
strncmp
MmGetSystemRoutineAddress
_wcsnicmp
ObfDereferenceObject
ObQueryNameString
_strnicmp
RtlCopyUnicodeString
ZwUnmapViewOfSection
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 756B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ