Static task
static1
General
-
Target
65efa682fb79536bb53bfe569584fba8_JaffaCakes118
-
Size
41KB
-
MD5
65efa682fb79536bb53bfe569584fba8
-
SHA1
dc0812c28bcb06fc8c2f11f478e962f7c7f0aba2
-
SHA256
ab5e8d7dd5476c91c14f89b723dbf51cb6ceac829c79e73c98a5e4c289dd6d85
-
SHA512
5b9e6a58186f35c14b40a21d84a1e9c50a56e5499652cdc906dfa6514b5ed7f3f091f68e4d31d77bb70bfd27c1cd5b323cd5652c43f16b0339109238a2bcc345
-
SSDEEP
768:sYNrixc4uj51dOuK6a9ro+184tk480YpE9jpa08UpOPcB1E:Friu4gdOuKp1ptk48Vx0F1E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 65efa682fb79536bb53bfe569584fba8_JaffaCakes118
Files
-
65efa682fb79536bb53bfe569584fba8_JaffaCakes118.sys windows:4 windows x86 arch:x86
01cb49859d95fd9c7c50a692a430ea89
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwQueryValueKey
RtlInitUnicodeString
ZwCreateFile
swprintf
wcslen
wcscat
wcscpy
_wcsicmp
ZwOpenKey
_except_handler3
ExFreePool
_snprintf
ExAllocatePoolWithTag
strncpy
PsLookupProcessByProcessId
_stricmp
PsGetVersion
PsSetCreateProcessNotifyRoutine
RtlCompareUnicodeString
ZwSetValueKey
wcsstr
_wcslwr
IoRegisterDriverReinitialization
_snwprintf
wcsncpy
wcschr
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ObfDereferenceObject
MmGetSystemRoutineAddress
MmIsAddressValid
IoGetCurrentProcess
ObReferenceObjectByHandle
wcsrchr
ZwDeleteKey
ZwCreateKey
_wcsnicmp
RtlCopyUnicodeString
KeQuerySystemTime
strncmp
ZwSetInformationFile
PsCreateSystemThread
IofCompleteRequest
RtlAnsiStringToUnicodeString
IoDeviceObjectType
KeTickCount
KeQueryTimeIncrement
KeDelayExecutionThread
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 57B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ