Static task
static1
General
-
Target
639122e23bfd6a334a1045c8cf27989f_JaffaCakes118
-
Size
41KB
-
MD5
639122e23bfd6a334a1045c8cf27989f
-
SHA1
4c62325dc608c322479d97e61fb8d0884bd3463e
-
SHA256
8fada641ad8e334d2480c230fcc9810922a03d4f491e55e79d738b532592ae7d
-
SHA512
b880a81135fbea5fca515b0d42ac9039850f6a8518a4f75d50c7c356a7b5a3634e1ddba79a8d1d6240ed6a75d1b5767075d723e631dde0a2b7d59568c03b63f0
-
SSDEEP
768:rA6xHBgDI1qt9Fnpznr3LX0BNLB86ZatCTmsBlmZddpC8MiXzWikW1oPWEH:rAUBgDN9FpznrLyZZatCTmsjmZn/XKiy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 639122e23bfd6a334a1045c8cf27989f_JaffaCakes118
Files
-
639122e23bfd6a334a1045c8cf27989f_JaffaCakes118.sys windows:5 windows x86 arch:x86
fb3c4d91c060a4c67815932bcdebd9ff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
InterlockedPushEntrySList
MmGetSystemRoutineAddress
ExAllocatePoolWithTag
RtlAnsiStringToUnicodeString
KeBugCheck
RtlInitAnsiString
PsGetCurrentProcess
MmIsNonPagedSystemAddressValid
RtlIpv4AddressToStringA
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 384B - Virtual size: 356B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ