Static task
static1
General
-
Target
5d3ac38af0480d9adda73c37df9b5eb6_JaffaCakes118
-
Size
30KB
-
MD5
5d3ac38af0480d9adda73c37df9b5eb6
-
SHA1
23e0e4eace736491fd5b79ceb94370c8e27b5fee
-
SHA256
e8b511a49b53cc726c81c526a33fff5a70132ce8329d0c4fa7598b86398edb49
-
SHA512
ed22edc9143ad13e61d0353e3874f26d131254c7cf5f9b8542dc58578f9c87f42ec2cdb581bba42f7eeaf3004e7751c14508a32b6ac7f6a8f88cc94408286a65
-
SSDEEP
192:ieGbQnyQl8rZ8kfIXpSDE9QVl3dLcMe+dHCP9zDHa8P0E/DeP4PZqN:JGcyQir1fkM/dLzdiFJ84PZqN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d3ac38af0480d9adda73c37df9b5eb6_JaffaCakes118
Files
-
5d3ac38af0480d9adda73c37df9b5eb6_JaffaCakes118.sys windows:6 windows x86 arch:x86
b22d052eb22368805fada58abe5d51b8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoGetCurrentProcess
strncmp
ObfDereferenceObject
PsLookupProcessByProcessId
PsGetCurrentProcessId
ObOpenObjectByPointer
ObReferenceObjectByHandle
KeSetEvent
ExFreePoolWithTag
KeGetCurrentThread
KeServiceDescriptorTable
memcpy
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
_strnicmp
ExAllocatePoolWithTag
IoCreateSymbolicLink
IoCreateDevice
DbgPrint
memset
ZwClose
ProbeForRead
KeWaitForSingleObject
memmove
KeTickCount
KeBugCheckEx
IofCompleteRequest
PsSetCreateProcessNotifyRoutine
KeInitializeEvent
RtlUnwind
hal
ExAcquireFastMutex
ExReleaseFastMutex
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 938B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ