Static task
static1
General
-
Target
8654d9f6f084776c3a6fc52c607d476e_JaffaCakes118
-
Size
3KB
-
MD5
8654d9f6f084776c3a6fc52c607d476e
-
SHA1
82de736daa186a1593a13c4e9b9acb394754f203
-
SHA256
7d813e0da85c4b35dadfea477d52aa6fcf7df6c04ea9ab334d8c11dc0a90b0c4
-
SHA512
aa1482525e1b20d702fdd9dda688f941563a91d3e86dd225bc2adc8e65d15b5fc4dc00a57326d28c5adca443de608c0651dfbfaeeb3c13f12c408e07dc237ff9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8654d9f6f084776c3a6fc52c607d476e_JaffaCakes118
Files
-
8654d9f6f084776c3a6fc52c607d476e_JaffaCakes118.sys windows:5 windows x86 arch:x86
de05613d084088b1bf3d1b7b8c486423
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
ZwReadFile
KeServiceDescriptorTable
ZwClose
RtlFreeUnicodeString
ZwCreateFile
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 192B - Virtual size: 164B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192B - Virtual size: 177B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 96B - Virtual size: 69B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 480B - Virtual size: 478B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 126B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ