Static task
static1
General
-
Target
611934aaf9b8df1090ebbb1e9ad3b58a_JaffaCakes118
-
Size
9KB
-
MD5
611934aaf9b8df1090ebbb1e9ad3b58a
-
SHA1
0438cbe21872e49ec33cb8c09333aecd55e931b0
-
SHA256
7340ee093122236e5c12db97bf9e599cc92eed87b632fd5d7ddeb46b160769b2
-
SHA512
cfabe2d8467e54a85172cb8efb4e6f9454f1f3f5dcf3915a86e052fda4363575bb60217fa4332588783926510379607bd4477bc020a50ba1febbc8a07a948d8e
-
SSDEEP
192:TzihTkKZybMgqW4DLaHTMf+4IkcoLTkpLgRs3C9:ihObMgoXJm4LXC4
Malware Config
Signatures
Files
-
611934aaf9b8df1090ebbb1e9ad3b58a_JaffaCakes118.sys windows:5 windows x86 arch:x86
b7a9ada452380dbef2c10f17db0ca25c
Code Sign
09:35:77:6f:cd:60:c4:8a:43:24:39:26:7b:b7:44:bcCertificate
IssuerCN=VeriSign Class 3 Code Signing 2004 CANot Before14/02/2012, 08:40Not After31/12/2039, 23:59SubjectCN=Tencent Technology(Shenzhen) Company LimitedSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
_except_handler3
IoCreateFile
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
IofCallDriver
KeGetCurrentThread
KeInitializeEvent
ObfDereferenceObject
IoAllocateIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
MmGetSystemRoutineAddress
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
IofCompleteRequest
ZwClose
KeServiceDescriptorTable
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
wcslen
hal
KeGetCurrentIrql
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 890B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 274B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ