Static task
static1
General
-
Target
71c1b58c900b1aba204c3775b8a90c0d_JaffaCakes118
-
Size
28KB
-
MD5
71c1b58c900b1aba204c3775b8a90c0d
-
SHA1
7387b5ec29d488a87440bf98d8745a29ec6d8f97
-
SHA256
f2d5eac5fe40f4d7cacce702041d495c7321d55624fb2e78dd03dd8cafd96f32
-
SHA512
d16891d20534c35f35c9830c4951a4ae1f3391596984460094921dec38b4d4e804c89760a365bc3865473035c095bf666b2a7c6e1331083e6f1c23e1057bbac5
-
SSDEEP
768:wETUckhyt5Vxdpl0o4KnOZGlYfCpMfcXOfrgKH2:7WEt5VxdplV4lWvWf4/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 71c1b58c900b1aba204c3775b8a90c0d_JaffaCakes118
Files
-
71c1b58c900b1aba204c3775b8a90c0d_JaffaCakes118.sys windows:4 windows x86 arch:x86
798d57121d1906f67d8a81e101f9271c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
ZwClose
ExFreePool
ExAllocatePoolWithTag
RtlInitUnicodeString
strncpy
IoGetCurrentProcess
MmIsAddressValid
wcscat
swprintf
MmGetSystemRoutineAddress
RtlAnsiStringToUnicodeString
RtlCompareUnicodeString
ExGetPreviousMode
wcscpy
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
_except_handler3
_wcsnicmp
wcslen
KeServiceDescriptorTable
ObfDereferenceObject
ObQueryNameString
RtlCopyUnicodeString
_strnicmp
ZwUnmapViewOfSection
strncmp
_stricmp
_snprintf
ZwQuerySystemInformation
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 768B - Virtual size: 756B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ