Static task
static1
General
-
Target
88aa4671cdc193bb0838aa6d1c953b04_JaffaCakes118
-
Size
768KB
-
MD5
88aa4671cdc193bb0838aa6d1c953b04
-
SHA1
e4fe90d6efd8871e85237386b7d1df8f17a3757e
-
SHA256
1166ff2547efc42525c13dc9801686ffcb35a1ad2fbefc1ecc569cd5e7845474
-
SHA512
eece05f0303844398a038e814b567439bc711b73ed5b2eb374ebabaa1b1339aae10362a1f8fc5999525c5ddbded48021c2a4c72c34bb39d10c91b1dffdf3091f
-
SSDEEP
12288:5b9d3uWy45d0R/g8ShQC8ePP7RZWIaOi+DPYs2bXXGIADWgKPLCC+QHsotui:5j/y9QBTDaZ+8s2bXXGIADjKD3+QH90
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 88aa4671cdc193bb0838aa6d1c953b04_JaffaCakes118
Files
-
88aa4671cdc193bb0838aa6d1c953b04_JaffaCakes118.sys windows:4 windows x86 arch:x86
7c205c6e987fcb47d42f498f43ebfd73
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
sprintf
ZwQuerySystemInformation
ExAllocatePoolWithTag
ExFreePoolWithTag
ObMakeTemporaryObject
IoWMISuggestInstanceName
IoDetachDevice
ExReinitializeResourceLite
RtlGetOwnerSecurityDescriptor
CcCopyRead
toupper
_aullshr
RtlAnsiCharToUnicodeChar
KeInitializeEvent
IoIsSystemThread
SeDeleteAccessState
RtlSetSaclSecurityDescriptor
KeServiceDescriptorTable
KeUnstackDetachProcess
KeInitializeSpinLock
MmProbeAndLockProcessPages
SeSetSecurityDescriptorInfo
ObReleaseObjectSecurity
IoReportTargetDeviceChangeAsynchronous
IoCreateDevice
RtlFindMessage
RtlAreBitsSet
RtlUnicodeStringToOemString
NtSetQuotaInformationFile
MmForceSectionClosed
PfxInsertPrefix
KeProfileInterruptWithSource
IoAttachDeviceByPointer
IoThreadToProcess
KeFlushEntireTb
WRITE_REGISTER_USHORT
ZwDeviceIoControlFile
RtlxUnicodeStringToOemSize
RtlDeleteAce
NtOpenProcessToken
_local_unwind2
IoCreateDriver
PsLookupProcessThreadByCid
ExSetResourceOwnerPointer
IoDeleteDevice
Exi386InterlockedIncrementLong
RtlDeleteRegistryValue
SeReleaseSecurityDescriptor
CcSetBcbOwnerPointer
IoGetTopLevelIrp
KeReleaseSpinLockFromDpcLevel
NlsAnsiCodePage
ZwDeleteFile
MmFreeContiguousMemorySpecifyCache
RtlLargeIntegerAdd
IoCreateSymbolicLink
NtSetInformationFile
RtlxUnicodeStringToAnsiSize
WRITE_REGISTER_ULONG
MmLockPagableSectionByHandle
RtlGetDaclSecurityDescriptor
FsRtlPostStackOverflow
MmAllocatePagesForMdl
RtlUpcaseUnicodeStringToCountedOemString
RtlLookupElementGenericTableFull
KeInitializeQueue
MmLockPagableImageSection
InterlockedIncrement
ObQueryObjectAuditingByHandle
FsRtlLookupMcbEntry
RtlMapGenericMask
ZwSetValueKey
strncpy
ZwClearEvent
IoSetShareAccess
RtlDelete
IoGetDeviceInterfaceAlias
NtQueryVolumeInformationFile
ExReleaseResourceLite
RtlLargeIntegerNegate
PoRegisterDeviceForIdleDetection
IoCheckDesiredAccess
ZwReadFile
Sections
.text Size: 349KB - Virtual size: 348KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 358B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 402KB - Virtual size: 401KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ