Static task
static1
General
-
Target
4480c833ae308f3584ca21db73180489_JaffaCakes118
-
Size
40KB
-
MD5
4480c833ae308f3584ca21db73180489
-
SHA1
3dd5c479cceab1ba9b2aab127100dfb06a4fc2c8
-
SHA256
fd6b68852620f9bfc86f20442a35a5e3ae412fc20eabf15324fe38478f345967
-
SHA512
971fbd50c2ae1bbce36d0e3c1c96dd657515707c0aa1cff697c8f28956077c86b03feb1ddbb92165bc09befd1217ef97760e40ee02a49000d6da292d4b828f4f
-
SSDEEP
768:tkksbvj8C65q7kpkwa0IfgOko4QNDr12n75vH4VrNpJST:G98C65IB0IIOkODr275vYdNpc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4480c833ae308f3584ca21db73180489_JaffaCakes118
Files
-
4480c833ae308f3584ca21db73180489_JaffaCakes118.sys windows:4 windows x86 arch:x86
a1130f7df0c8a149a2ca3fa16addc75f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_stricmp
swprintf
wcsstr
_wcslwr
_wcsicmp
wcsncpy
wcslen
wcsrchr
ZwClose
ZwSetInformationFile
ZwCreateFile
RtlInitUnicodeString
wcscpy
strncpy
IoGetCurrentProcess
MmGetSystemRoutineAddress
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwDeleteKey
ZwOpenKey
KeQuerySystemTime
_snwprintf
ExAllocatePoolWithTag
ZwSetValueKey
RtlCompareUnicodeString
KeTickCount
KeQueryTimeIncrement
RtlAnsiStringToUnicodeString
wcscat
ZwQueryValueKey
_except_handler3
_wcsnicmp
ObfDereferenceObject
MmIsAddressValid
PsGetVersion
ZwCreateKey
IoRegisterDriverReinitialization
strncmp
ObReferenceObjectByHandle
KeDelayExecutionThread
ExFreePool
IoDeviceObjectType
RtlCopyUnicodeString
PsCreateSystemThread
_snprintf
PsLookupProcessByProcessId
PsSetCreateProcessNotifyRoutine
IofCompleteRequest
wcschr
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 96B - Virtual size: 73B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ