Static task
static1
General
-
Target
4d493ca5cfeeeec4f136120ce8aa2505_JaffaCakes118
-
Size
40KB
-
MD5
4d493ca5cfeeeec4f136120ce8aa2505
-
SHA1
ce2b9b12af9f21151c258ab4fe816672207ba8f6
-
SHA256
188cee7f1cd69c3ebfd1e3c6f800f0485f013bc3a13679a11f45a0d36c6c66d8
-
SHA512
873335099234bec4460d258a133276127ada6f9778c9622d57da2a70917e2124c9f2ffd6bb504ceb26c281456419f46493dc56f74f038ffdbbe8148bd8ec9d24
-
SSDEEP
768:x7iu/73rghPf9u+0dopZpd88zqpXVAJNHk0NOla9GOrdC:z/zsX9uJCH8VCkw/9GOr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4d493ca5cfeeeec4f136120ce8aa2505_JaffaCakes118
Files
-
4d493ca5cfeeeec4f136120ce8aa2505_JaffaCakes118.sys windows:4 windows x86 arch:x86
568cafcd6e292ddd452cfa8c45eba35e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ObfDereferenceObject
MmIsAddressValid
IoDeviceObjectType
wcslen
wcscat
wcscpy
_wcsicmp
ZwClose
ZwQueryValueKey
RtlInitUnicodeString
ZwOpenKey
_except_handler3
KeDelayExecutionThread
KeQuerySystemTime
ZwSetInformationFile
ZwCreateFile
swprintf
strncmp
IoGetCurrentProcess
PsCreateSystemThread
_snwprintf
wcsncpy
wcschr
ZwSetValueKey
RtlAnsiStringToUnicodeString
ObReferenceObjectByHandle
ExFreePool
ExAllocatePoolWithTag
IofCompleteRequest
RtlCompareUnicodeString
_snprintf
wcsrchr
PsGetVersion
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_stricmp
wcsstr
_wcslwr
IoRegisterDriverReinitialization
ZwCreateKey
KeTickCount
KeQueryTimeIncrement
strncpy
PsLookupProcessByProcessId
_wcsnicmp
RtlCopyUnicodeString
ZwDeleteKey
MmGetSystemRoutineAddress
PsSetCreateProcessNotifyRoutine
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 64B - Virtual size: 51B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ