Static task
static1
General
-
Target
61379be6adc156a2602e4426e734b6ce_JaffaCakes118
-
Size
40KB
-
MD5
61379be6adc156a2602e4426e734b6ce
-
SHA1
a8c023158f9b7f8c4f8087dced097cbc679d2ea9
-
SHA256
b21a909d58b212e5bcd264bbf049a94d546e0ef4b4bc99a1f21cfd3a47e7983b
-
SHA512
6e6878b26edf4522a38676a4d9df5913028e02d8cd6679953fdef37aa9c00408214aefd705e796cc97e447ecc2a8cb648137a6f4bca9463148534b8d05cabec4
-
SSDEEP
768:bzL8oZzAOfXhCn2C4xMI0T5K8U64/fVXqAPP39HGLiP5Fowhz5koMeuvlbIIASNN:IoZkqwtEMI+5KL643VXqkPAirow1OoVU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 61379be6adc156a2602e4426e734b6ce_JaffaCakes118
Files
-
61379be6adc156a2602e4426e734b6ce_JaffaCakes118.sys windows:4 windows x86 arch:x86
865e78184fe321f2fed2a04df13304ba
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlCopyUnicodeString
PsSetCreateProcessNotifyRoutine
swprintf
ZwClose
ZwQueryValueKey
RtlInitUnicodeString
KeDelayExecutionThread
KeQuerySystemTime
MmIsAddressValid
IoDeviceObjectType
RtlAnsiStringToUnicodeString
ZwSetValueKey
ZwOpenKey
_wcsicmp
wcsncpy
wcslen
wcsrchr
_except_handler3
ObfDereferenceObject
strncmp
ExFreePool
_snprintf
ExAllocatePoolWithTag
IoGetCurrentProcess
PsGetVersion
_snwprintf
KeTickCount
KeQueryTimeIncrement
_stricmp
ZwCreateKey
wcscat
wcscpy
IofCompleteRequest
wcsstr
_wcslwr
IoRegisterDriverReinitialization
wcschr
PsCreateSystemThread
ObReferenceObjectByHandle
strncpy
RtlCompareUnicodeString
ZwDeleteKey
_wcsnicmp
PsLookupProcessByProcessId
ZwCreateFile
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
MmGetSystemRoutineAddress
ZwSetInformationFile
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 61B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ