Static task
static1
General
-
Target
5b585397430b88b8d8f7c05c09aa0b53_JaffaCakes118
-
Size
40KB
-
MD5
5b585397430b88b8d8f7c05c09aa0b53
-
SHA1
c0b36981dd4064fb62f5dd7da14c27db8f42c2cd
-
SHA256
140ad72818c96fb645f0510125421875739a7dc64ba6cbd4ac94961554e6c201
-
SHA512
b29eacbd1c65affbf42f7f9e016e5b984b6949bf15f8f44d0152bcc047143861be9b6bdbf917528b81e8b48d11bb76b573044ab6b0492ab6904f7bd54318bffe
-
SSDEEP
768:DmjfRmioVcmSwLykghrDB8AErimmemHIL9Mg6ezDc7ixhfYby/BFAz:D8YioBSSykghr2AwmemHIJ8e07GYWA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b585397430b88b8d8f7c05c09aa0b53_JaffaCakes118
Files
-
5b585397430b88b8d8f7c05c09aa0b53_JaffaCakes118.sys windows:4 windows x86 arch:x86
e90ffcfe8d24426f5c7113a7981950df
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmIsAddressValid
ZwClose
ZwDeleteKey
swprintf
ZwOpenKey
RtlInitUnicodeString
ZwQueryValueKey
PsSetCreateProcessNotifyRoutine
RtlCopyUnicodeString
ExFreePool
ExAllocatePoolWithTag
ObfDereferenceObject
ZwSetValueKey
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_wcsnicmp
wcslen
_except_handler3
ZwSetInformationFile
ZwCreateFile
wcscpy
ZwCreateKey
_wcsicmp
wcsncpy
wcsrchr
wcscat
_snwprintf
wcschr
IofCompleteRequest
IoDeviceObjectType
RtlCompareUnicodeString
ObReferenceObjectByHandle
PsCreateSystemThread
strncpy
IoGetCurrentProcess
KeTickCount
KeQueryTimeIncrement
_stricmp
PsLookupProcessByProcessId
RtlAnsiStringToUnicodeString
strncmp
KeDelayExecutionThread
KeQuerySystemTime
PsGetVersion
MmGetSystemRoutineAddress
wcsstr
_wcslwr
_snprintf
IoRegisterDriverReinitialization
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 53B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ