Static task
static1
General
-
Target
85e408abe41493092866a2c00295e093_JaffaCakes118
-
Size
9KB
-
MD5
85e408abe41493092866a2c00295e093
-
SHA1
e0cb9a5f35979a3df8c550a1908913a2302a5cc8
-
SHA256
0614d1e951d64d978e936a9833d3ebfd1910f0eb4f41abdd17dc67013da7f17a
-
SHA512
57466fcb0ecbadd312ddfc508a3f439e09fa6d7a56a08bc9fc63aca69c8eeb046a0490173367f87f77496f3f7c6857a1cda40250efc76713bb3969d9283d980b
-
SSDEEP
192:TNihTkKZybMgqW4DLaHTMf+4IkcomW9Lg+s3Cd:ohObMgoXJm4LRBh
Malware Config
Signatures
Files
-
85e408abe41493092866a2c00295e093_JaffaCakes118.sys windows:5 windows x86 arch:x86
b7a9ada452380dbef2c10f17db0ca25c
Code Sign
09:35:77:6f:cd:60:c4:8a:43:24:39:26:7b:b7:44:bcCertificate
IssuerCN=VeriSign Class 3 Code Signing 2004 CANot Before14/02/2012, 08:40Not After31/12/2039, 23:59SubjectCN=Tencent Technology(Shenzhen) Company LimitedSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
_except_handler3
IoCreateFile
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
IofCallDriver
KeGetCurrentThread
KeInitializeEvent
ObfDereferenceObject
IoAllocateIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
MmGetSystemRoutineAddress
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
IofCompleteRequest
ZwClose
KeServiceDescriptorTable
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
wcslen
hal
KeGetCurrentIrql
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 890B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 274B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ