Static task
static1
General
-
Target
66766c1113a59be82b27b1cb7da22b27_JaffaCakes118
-
Size
39KB
-
MD5
66766c1113a59be82b27b1cb7da22b27
-
SHA1
1bf04361e9367f014db5742bab5ab0965d3fff0b
-
SHA256
de2a487abc597e48bb2a5fe6015948c3e991da62c5e8b0a93144dc82a224ea7a
-
SHA512
34ef780d4164f1c64f3130f0f9787b9732eddb08a81d2683833248d6117300b6015cbc5489f5aecd46bec33349aad695dc194c26327f8492430b421cb2a7953f
-
SSDEEP
768:zs2r+F1IG2g5wTZYJPYukXg6S3DBX5eapQ0r4FzfdrCvAvn3f/EbFye1SEX:42e1IG2g5+eJPYu+g6QDTO0r4Ble4v34
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66766c1113a59be82b27b1cb7da22b27_JaffaCakes118
Files
-
66766c1113a59be82b27b1cb7da22b27_JaffaCakes118.sys windows:5 windows x86 arch:x86
7cdede4b9ae1f52f9595f2bbf37c3723
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitAnsiString
SeAppendPrivileges
KeBugCheck
RtlAnsiStringToUnicodeString
SeDeleteAccessState
ExAllocatePoolWithTag
MmIsNonPagedSystemAddressValid
RtlSetDaclSecurityDescriptor
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 384B - Virtual size: 356B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ