Static task
static1
General
-
Target
69ed4d2ed5ee873f9b3376710f429a05_JaffaCakes118
-
Size
40KB
-
MD5
69ed4d2ed5ee873f9b3376710f429a05
-
SHA1
59ee99d52ae824d52abc354ac4b382057d69b067
-
SHA256
b98bfd06ac0cd56438e34c020ad960ae86b28f9061c66c8636436a51cb7a5716
-
SHA512
0f2d066e9d762d75664f36b2aff7c9aa9208e814387a3ed03f513436fcc560707dc0a30ac94a06f5dda9c24cabb972b8239578c0b1dc8ca313d9936c05ba778b
-
SSDEEP
768:njjlL4yetOVbX0xeu/Jk2zV0/hU8buGnx55Z5/dq5ees:1LleI5ZgJk2zV0/hP6258i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 69ed4d2ed5ee873f9b3376710f429a05_JaffaCakes118
Files
-
69ed4d2ed5ee873f9b3376710f429a05_JaffaCakes118.sys windows:4 windows x86 arch:x86
75ff4d53370f652f0bd20336d709544e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwSetValueKey
RtlAnsiStringToUnicodeString
strncmp
IoGetCurrentProcess
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
ZwClose
PsGetVersion
swprintf
_stricmp
wcsstr
_wcslwr
ZwDeleteKey
ZwCreateKey
strncpy
PsLookupProcessByProcessId
_snwprintf
wcsncpy
wcslen
wcschr
KeDelayExecutionThread
KeQuerySystemTime
ZwQueryValueKey
ZwOpenKey
_except_handler3
ObReferenceObjectByHandle
MmIsAddressValid
ExFreePool
_snprintf
ExAllocatePoolWithTag
RtlCompareUnicodeString
IoDeviceObjectType
RtlCopyUnicodeString
IoRegisterDriverReinitialization
KeTickCount
KeQueryTimeIncrement
PsCreateSystemThread
PsSetCreateProcessNotifyRoutine
wcscat
wcscpy
_wcsicmp
wcsrchr
ObfDereferenceObject
_wcsnicmp
IofCompleteRequest
ZwCreateFile
ZwSetInformationFile
MmGetSystemRoutineAddress
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 64B - Virtual size: 40B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ