Static task
static1
General
-
Target
63c1a3de5bb9bbae66a5a0a905d1c19b_JaffaCakes118
-
Size
4KB
-
MD5
63c1a3de5bb9bbae66a5a0a905d1c19b
-
SHA1
101ffc1c7255af587b393c5cc76213354d8c3c49
-
SHA256
a14319bbfde279d340064bb2df2684d24404865fa70a5c036865bbf96b3167af
-
SHA512
3b00c7252cc3b409995c5d590392fb78df97931eae8b13b0bf8d38bae990b699c7c9572c8bdcfb535b4474a893770e93ec3c5acf89e6f916bc054edd6e6430af
-
SSDEEP
48:SMcxtiB25t1Tg+2Iu+qkM/bUuzIy1RjpCwU1xD/uZ:b+vTlPuyAUSIkW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 63c1a3de5bb9bbae66a5a0a905d1c19b_JaffaCakes118
Files
-
63c1a3de5bb9bbae66a5a0a905d1c19b_JaffaCakes118.sys windows:4 windows x86 arch:x86
a55c058292a2cab40174e9bdf53105f7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
PsSetLoadImageNotifyRoutine
KeInitializeApc
KeInsertQueueApc
FsRtlIsNameInExpression
RtlImageDirectoryEntryToData
DbgPrint
ZwAllocateVirtualMemory
ExAllocatePool
ExAllocatePoolWithTag
KeGetCurrentThread
ExFreePoolWithTag
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 514B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ