Static task
static1
General
-
Target
83612d92abaf251dc802b4bb7ed4469e_JaffaCakes118
-
Size
28KB
-
MD5
83612d92abaf251dc802b4bb7ed4469e
-
SHA1
e83d1ccace2b218b3c25b6c5502cb7cfb5b14abd
-
SHA256
211fc99bd271c21700b0046db4c4ee9e5e0eeda3adbc2a9a32d4a3e767a500ff
-
SHA512
ca9d4052c63878bf8b68d17d8ca9ef658b1f145ca95c3e5fb550ddfa484bfd4904a7589a3c115c9a41bbb8e71ed68a0db01267866d407b0a7db630eec6d91a14
-
SSDEEP
768:2EK9lkyHjXJpiLv+i11OGHoZk6F/ypvHCGcysr:2EK9ayD5p2v+Y1OGIZky/ypvHLlC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 83612d92abaf251dc802b4bb7ed4469e_JaffaCakes118
Files
-
83612d92abaf251dc802b4bb7ed4469e_JaffaCakes118.sys windows:4 windows x86 arch:x86
fbbcf3058b6ca197a9a7b403420850e6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
wcslen
wcscat
wcscpy
swprintf
_wcsnicmp
_except_handler3
_strnicmp
strncmp
_stricmp
strncpy
_itow
RtlAnsiStringToUnicodeString
ZwClose
ZwOpenKey
ObfDereferenceObject
ExFreePool
_snprintf
ExAllocatePoolWithTag
IofCompleteRequest
MmGetSystemRoutineAddress
RtlCopyUnicodeString
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 866B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ