Static task
static1
General
-
Target
612082f7d6a6d9138b7878800a75a40c_JaffaCakes118
-
Size
40KB
-
MD5
612082f7d6a6d9138b7878800a75a40c
-
SHA1
7784cfbff8e9a618ab32c30d3a1fd3c72cca13a8
-
SHA256
774d8e7373aa91135656475e0c169f395e53618e21f58d2cbea177f26b02e3da
-
SHA512
d23ec723044c15cae73dadccd1e56a034875b88e555aea3e4dabceddadbe3d82c06a3ad06aaac5a6fbb1974d1c37cb72a96d70e3e6426a504779e5887d701f7f
-
SSDEEP
768:vIm3dPPnyCR2JGB1bj9A+S30ddKOy/BqEYeDvpB8sdJXjAW8L3:bS3sB1v6+dTy/B+ghB8IXJ87
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 612082f7d6a6d9138b7878800a75a40c_JaffaCakes118
Files
-
612082f7d6a6d9138b7878800a75a40c_JaffaCakes118.sys windows:4 windows x86 arch:x86
2f59677cc83bce0ff3615ddc1525db21
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
swprintf
ExFreePool
_snprintf
ExAllocatePoolWithTag
KeTickCount
KeQueryTimeIncrement
_stricmp
ZwClose
PsGetVersion
ZwSetValueKey
RtlCompareUnicodeString
RtlInitUnicodeString
ZwOpenKey
_wcsicmp
wcsncpy
wcslen
wcsrchr
PsSetCreateProcessNotifyRoutine
ZwDeleteKey
MmGetSystemRoutineAddress
RtlAnsiStringToUnicodeString
ZwCreateKey
MmIsAddressValid
IoGetCurrentProcess
ZwQueryValueKey
wcsstr
_wcslwr
wcscat
wcscpy
_except_handler3
_snwprintf
IoRegisterDriverReinitialization
ZwSetInformationFile
ZwCreateFile
KeQuerySystemTime
ObfDereferenceObject
strncpy
IofCompleteRequest
PsCreateSystemThread
strncmp
PsLookupProcessByProcessId
_wcsnicmp
ObReferenceObjectByHandle
IoDeviceObjectType
KeDelayExecutionThread
wcschr
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlCopyUnicodeString
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 62B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ