Static task
static1
General
-
Target
5c3dbedfa6bdd7a04235e0e77fce472b_JaffaCakes118
-
Size
28KB
-
MD5
5c3dbedfa6bdd7a04235e0e77fce472b
-
SHA1
4dd09e0fe0be8e6ae7783dbbd9a2d0d73fac1b03
-
SHA256
f9a21cf64a515737750fb18782860db2a1866812b696344585397dba13e39dd7
-
SHA512
f40fa1ff7fe376d074034aba65e62996e6dab2a99096f0845844c334512627b46b8d93ad2e8383052788a26a636b79842a3be90e98f0d7d299604cbd2063011a
-
SSDEEP
768:tlknp/ZG9oI9zUvs1qEa8J4NQBSHW2cWJ6f:Mp/k9z11qEaOKoS7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5c3dbedfa6bdd7a04235e0e77fce472b_JaffaCakes118
Files
-
5c3dbedfa6bdd7a04235e0e77fce472b_JaffaCakes118.sys windows:4 windows x86 arch:x86
144ec5ef38067bb440a77a540b2e183b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcscat
wcscpy
_itow
ObfDereferenceObject
swprintf
strncpy
RtlInitUnicodeString
ExFreePool
_snprintf
ExAllocatePoolWithTag
MmGetSystemRoutineAddress
strncmp
_stricmp
wcslen
ZwClose
ZwOpenKey
RtlCopyUnicodeString
RtlAnsiStringToUnicodeString
_wcsnicmp
_strnicmp
IofCompleteRequest
_except_handler3
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 928B - Virtual size: 918B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ