Static task
static1
General
-
Target
5a4cf481174fa80ea52e7c12868fe2c6_JaffaCakes118
-
Size
40KB
-
MD5
5a4cf481174fa80ea52e7c12868fe2c6
-
SHA1
b2611267b9849af5417f61417cc36bb159231ff9
-
SHA256
98e20bc24f6a7602ef567ecbef2186a519024df0bd958607a087d4eb596a1500
-
SHA512
35d3ac6661b059253d680ea76bea6717fcf6a2fd3cdffac4eeb34855a29de3938ad0a650150fa37a5c5ce6e59c2e161d72b1121ca79b64b010a5d42694d70342
-
SSDEEP
768:sKSoZyCLWl/qlptku8RwJAunV0XAhSDSG1k19OGZ4wtUUgGPL7mPeUnQlyFmnL65:+CLWl/qrtlpJdVoD9O1AGZBgGP/mPBQ6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5a4cf481174fa80ea52e7c12868fe2c6_JaffaCakes118
Files
-
5a4cf481174fa80ea52e7c12868fe2c6_JaffaCakes118.sys windows:4 windows x86 arch:x86
14141ab3b9a05fe93f4847f5f50877f9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcsncpy
MmIsAddressValid
IoGetCurrentProcess
PsGetVersion
ZwQueryValueKey
RtlInitUnicodeString
PsSetCreateProcessNotifyRoutine
strncmp
KeTickCount
KeQueryTimeIncrement
_stricmp
IoRegisterDriverReinitialization
ObfDereferenceObject
ZwClose
ZwOpenKey
KeQuerySystemTime
ZwSetInformationFile
ZwCreateFile
wcslen
wcscpy
swprintf
_wcsicmp
wcsrchr
strncpy
PsLookupProcessByProcessId
ZwSetValueKey
_except_handler3
ObReferenceObjectByHandle
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwDeleteKey
_snwprintf
wcschr
MmGetSystemRoutineAddress
ExFreePool
ExAllocatePoolWithTag
_snprintf
RtlCopyUnicodeString
wcscat
RtlAnsiStringToUnicodeString
IoDeviceObjectType
ZwCreateKey
IofCompleteRequest
PsCreateSystemThread
RtlCompareUnicodeString
_wcsnicmp
wcsstr
_wcslwr
KeDelayExecutionThread
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 57B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ