Static task
static1
General
-
Target
4dd09a636eb70b96dd4953498ff6b994_JaffaCakes118
-
Size
8KB
-
MD5
4dd09a636eb70b96dd4953498ff6b994
-
SHA1
ef7347c594863eb2c78a777c223b756b2ae6cfb8
-
SHA256
d0e8a996ad04ead8c3d6a8d692bf25356e7173a11be025fe73ecc603c63275fa
-
SHA512
abfa893806991aad3988a8bf70fc54696cee91121e5bfea6367e631a929f2bcc38cfb4dd8c0dd102189ed108bbb52769632b559847779d0b6aeb1d24f1e652d2
-
SSDEEP
192:52Nve1fvRxFSFSSXf1+sZ1rc7J/yBkLxzG3uyGkUvuO3Ux7QKj:5EvUvHywW1rIWt3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4dd09a636eb70b96dd4953498ff6b994_JaffaCakes118
Files
-
4dd09a636eb70b96dd4953498ff6b994_JaffaCakes118.sys windows:4 windows x86 arch:x86
7e4706dc8a809afcf2fb1d0ed8056197
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ndis.sys
NdisGetCurrentSystemTime
NdisRegisterProtocol
ntoskrnl.exe
RtlInitUnicodeString
IoCreateDevice
IoCreateSymbolicLink
IofCompleteRequest
KeServiceDescriptorTable
MmIsAddressValid
IoGetCurrentProcess
PsLookupProcessByProcessId
ObDereferenceObject
IoGetDeviceObjectPointer
IoBuildDeviceIoControlRequest
IoCreateFile
IofCallDriver
RtlCompareUnicodeString
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 320B - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 544B - Virtual size: 536B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 688B - Virtual size: 676B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ