Static task
static1
General
-
Target
450085d40d88b2b1f731431ce2899c84_JaffaCakes118
-
Size
25KB
-
MD5
450085d40d88b2b1f731431ce2899c84
-
SHA1
2ef6bd1a2b07e0e6a3d394863e1e65fed7f10a17
-
SHA256
ea5322b46e2ae782dd43694645f63cd156ee1525c747b1149ade39da7394240c
-
SHA512
ed9c853534c453c432ac9f539fd69bef6d2990ea3be501cc40fc7a403cae9179ef634a80dcd6ebbc5f173a866173af8e442f7972c1cc4d0f4df1cd28c161aa3a
-
SSDEEP
384:0ENO2gjEJ8OGvt/BWsCwEVlTu7eioQQKUD6yas2BAEEQju:0mrw3WsC5VlT0oQQ51asHYju
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 450085d40d88b2b1f731431ce2899c84_JaffaCakes118
Files
-
450085d40d88b2b1f731431ce2899c84_JaffaCakes118.sys windows:4 windows x86 arch:x86
4f84d90bdfede82f8cff94c249c697ac
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcslen
swprintf
RtlInitUnicodeString
RtlCopyUnicodeString
RtlAnsiStringToUnicodeString
MmIsAddressValid
wcscpy
_except_handler3
RtlCompareUnicodeString
ExGetPreviousMode
_wcsnicmp
strncpy
_stricmp
strncmp
_strnicmp
IofCompleteRequest
ObfDereferenceObject
ZwClose
ZwQueryValueKey
ZwOpenKey
ExFreePool
_snprintf
ExAllocatePoolWithTag
MmGetSystemRoutineAddress
Sections
.text Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 928B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ