Static task
static1
Behavioral task
behavioral1
Sample
84afd2297fef8b4bff5d1ecd6736da62_JaffaCakes118.sys
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84afd2297fef8b4bff5d1ecd6736da62_JaffaCakes118.sys
Resource
win10v2004-20240802-en
General
-
Target
84afd2297fef8b4bff5d1ecd6736da62_JaffaCakes118
-
Size
32KB
-
MD5
84afd2297fef8b4bff5d1ecd6736da62
-
SHA1
a5296135b2b8f968ceae5e899834107be629941e
-
SHA256
ccac7765c40cc14277354d81d28b930201a91300ac30354aca856ea046c17651
-
SHA512
00099ab70a94f09a9c29ff0bf6151d272c4eef80427abc16e55fadf580187edc48e8fff6fa36218c23a796f9d27d8827589ee2af0653787fa065360747364aa3
-
SSDEEP
384:Fgk/lUCfHJc27/Gt1A1Z81O1AfYB82/tiBiP4ZawQNUsNOIILQUY+:lfHJc275cT2kI4ZawQNUUIsU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84afd2297fef8b4bff5d1ecd6736da62_JaffaCakes118
Files
-
84afd2297fef8b4bff5d1ecd6736da62_JaffaCakes118.sys .js windows:4 windows x86 arch:x86 polyglot
0681f6477aeb5225bc30512099859f31
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoDeleteSymbolicLink
RtlAnsiStringToUnicodeString
RtlInitAnsiString
MmGetSystemRoutineAddress
IoGetDeviceObjectPointer
ObfDereferenceObject
memcpy
KeWaitForSingleObject
IofCallDriver
IoBuildSynchronousFsdRequest
KeInitializeEvent
RtlFreeUnicodeString
memset
sprintf
_except_handler3
IofCompleteRequest
RtlEqualUnicodeString
IoCreateSymbolicLink
IoCreateDevice
IoDeleteDevice
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 576B - Virtual size: 566B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 544B - Virtual size: 542B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ