Static task
static1
General
-
Target
46f7ee9dc62515883b41dae2e8b370c4_JaffaCakes118
-
Size
40KB
-
MD5
46f7ee9dc62515883b41dae2e8b370c4
-
SHA1
fc000d4febecf24a0a3df4404564bc611f776337
-
SHA256
3dc81d28116e1dcc36d03e06a77e2962bee7b70599327f2be2921d6185923645
-
SHA512
6e3551f7a49130050221a8447ea5a0bb5d2569fcde4167d8eb95a1f8197d20cdd7de314aa98b788fc0341d7c190831a6028a5ac69553602e103bdac95f8a01c8
-
SSDEEP
768:SVZvM+atp6kZ1vV/7fkxTxZqlywmuh7LKmgD1/FvF71OQ63IcXzERNiW/:SVK7ppvV/7fkxTxZq4w1tK7pFpEQ64qU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46f7ee9dc62515883b41dae2e8b370c4_JaffaCakes118
Files
-
46f7ee9dc62515883b41dae2e8b370c4_JaffaCakes118.sys windows:4 windows x86 arch:x86
49fb4696134762f417ceeb5eb8f47779
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwOpenKey
RtlInitUnicodeString
ZwSetValueKey
ObReferenceObjectByHandle
strncpy
PsLookupProcessByProcessId
_stricmp
IoRegisterDriverReinitialization
IofCompleteRequest
strncmp
_snwprintf
wcsncpy
wcslen
wcschr
RtlCompareUnicodeString
IoGetCurrentProcess
ZwQueryValueKey
KeQuerySystemTime
ZwCreateKey
swprintf
wcsrchr
_wcsicmp
ZwDeleteKey
ObfDereferenceObject
MmIsAddressValid
_except_handler3
KeTickCount
KeQueryTimeIncrement
IoDeviceObjectType
wcsstr
_wcslwr
_wcsnicmp
ZwCreateFile
KeDelayExecutionThread
PsCreateSystemThread
wcscat
wcscpy
PsGetVersion
RtlAnsiStringToUnicodeString
PsSetCreateProcessNotifyRoutine
ExFreePool
_snprintf
ExAllocatePoolWithTag
ZwSetInformationFile
MmGetSystemRoutineAddress
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlCopyUnicodeString
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 56B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ