Static task
static1
General
-
Target
60b7c7efeb3ca1647ce5e28020928951_JaffaCakes118
-
Size
27KB
-
MD5
60b7c7efeb3ca1647ce5e28020928951
-
SHA1
b604e062a2be3316ff2959fa1fe135258949938e
-
SHA256
459fd3caa9f52ac9e0cae23d97eabaef146c7ff02445972117711342ea1c2cc5
-
SHA512
9e85955ea23fac1babb624cfb7ec85f477e016f205a6ea478bdcc3b005bbf36ca8173840f63e019a5f33028deb5100bbe638ff6286a01ac791627a2875f489b2
-
SSDEEP
768:YoOY4nNr0Q9XCWT8oOnEqbN1dv0zItrxMLpDSsJ:34nFVCWBWFbNXptrxYd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60b7c7efeb3ca1647ce5e28020928951_JaffaCakes118
Files
-
60b7c7efeb3ca1647ce5e28020928951_JaffaCakes118.sys windows:4 windows x86 arch:x86
e42f480200d61010f05a0ab6bb508146
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcscat
wcscpy
_itow
RtlCopyUnicodeString
RtlInitUnicodeString
_strnicmp
ObfDereferenceObject
RtlAnsiStringToUnicodeString
strncmp
IofCompleteRequest
wcslen
swprintf
_wcsnicmp
strncpy
ZwClose
ZwOpenKey
_stricmp
MmGetSystemRoutineAddress
ExFreePool
_snprintf
ExAllocatePoolWithTag
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 832B - Virtual size: 830B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ