Static task
static1
General
-
Target
6f02dae1e113b966df54f6e25b3e3161_JaffaCakes118
-
Size
28KB
-
MD5
6f02dae1e113b966df54f6e25b3e3161
-
SHA1
53ddf02bf92ffca83df256d2889e05319420fa9e
-
SHA256
a0f9d14aeb2c17eed26f5091eba8feb1101bc6f4d94df7ce024f7757672b3782
-
SHA512
62b1a7ddd1686d484aa3a941a4452bd544af75da16835e11accb88cd18ff1e5360f0a8503aa1145c9158896f06a2053a0521e544b2e9a9c5fca5999618662e58
-
SSDEEP
768:FPcEpUNOwGxXojtL/SESHI3eA2Qv9BO0ohNnPA40DJk:FcGUxUX0tbEAF9BO1hxA40DC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6f02dae1e113b966df54f6e25b3e3161_JaffaCakes118
Files
-
6f02dae1e113b966df54f6e25b3e3161_JaffaCakes118.sys windows:4 windows x86 arch:x86
a1a66cb7a0280b9e5a7757b285cd7240
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
swprintf
ObfDereferenceObject
RtlInitUnicodeString
wcslen
wcscat
wcscpy
_strnicmp
MmGetSystemRoutineAddress
RtlCopyUnicodeString
strncmp
ExFreePool
_snprintf
ExAllocatePoolWithTag
RtlAnsiStringToUnicodeString
_wcsnicmp
strncpy
IofCompleteRequest
_stricmp
ZwClose
ZwOpenKey
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 832B - Virtual size: 826B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ