Static task
static1
General
-
Target
874b449f5aa8dec52a303d28cfe60728_JaffaCakes118
-
Size
27KB
-
MD5
874b449f5aa8dec52a303d28cfe60728
-
SHA1
7eb2c1e682346f2d0f93022aac3b1421f1be096c
-
SHA256
cb2740f13214d9e589bcc6bbbbbba7c3f875df3e7983cad3e2cb828e1da7484c
-
SHA512
395c50771112495ab0380be60613a7d6e9d0c8f163e16430daec944ee2a849b30456c821a8153ff34fa1f1b007ef3ca2d49055e458242ce8667e88d038bf2272
-
SSDEEP
384:zyCAeL+/UPw9ZEfRB/txcEsxz25YxJkylzcZchKKlSoP+YUT:zL7w9+FxciY91QKlv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 874b449f5aa8dec52a303d28cfe60728_JaffaCakes118
Files
-
874b449f5aa8dec52a303d28cfe60728_JaffaCakes118.sys windows:4 windows x86 arch:x86
84e6c9929ae937d2afddb10301146a7a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ObfDereferenceObject
ObQueryNameString
IofCompleteRequest
swprintf
wcslen
RtlInitUnicodeString
_strnicmp
wcscpy
wcscat
_stricmp
RtlCompareUnicodeString
_wcsnicmp
strncpy
_except_handler3
ExFreePool
ExAllocatePoolWithTag
MmIsAddressValid
strncmp
IoGetCurrentProcess
MmGetSystemRoutineAddress
RtlCopyUnicodeString
RtlAnsiStringToUnicodeString
_snprintf
ZwQuerySystemInformation
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 704B - Virtual size: 700B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ