Static task
static1
General
-
Target
8b048ff18261d7190ed12456038b1895_JaffaCakes118
-
Size
76KB
-
MD5
8b048ff18261d7190ed12456038b1895
-
SHA1
991418522553e4a4af4b7141aea5370df4eaaf49
-
SHA256
354ebf95d4519ac9e98f16349aede3163270ec4a556be76e1c2f30466684d067
-
SHA512
368890d38183f52a6d7ba6f674cdde5ed1fdc0af6ba8514aebdf89a9966c3cee01bafeba0c1b8f881c63425f9a7869a70bc96b72033deff34278c85224685d44
-
SSDEEP
1536:pSaYnBYKNrgTnO/aW5mODC+EOPhxcQyA5eukQdawtOkeq7BmnfAfX8:PYnOKNh/P5meC+EOJxcQyA59kQdNR37
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b048ff18261d7190ed12456038b1895_JaffaCakes118
Files
-
8b048ff18261d7190ed12456038b1895_JaffaCakes118.sys windows:4 windows x86 arch:x86
ec13aafe5517a8dc64ad8a208532fc1b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmMapLockedPagesSpecifyCache
PsTerminateSystemThread
RtlCompareMemory
ZwClose
ObfDereferenceObject
KeWaitForSingleObject
KeSetEvent
KeDelayExecutionThread
PsSetCreateProcessNotifyRoutine
IofCompleteRequest
ExAllocatePoolWithTag
PsGetCurrentProcessId
PsSetLoadImageNotifyRoutine
KeInitializeEvent
RtlImageNtHeader
ExAllocatePool
atoi
ExInitializeResourceLite
strlen
wcscmp
IoGetLowerDeviceObject
IoCreateFile
PsGetVersion
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
wcslen
ObReferenceObjectByHandle
PsCreateSystemThread
RtlRandom
KeTickCount
KeQuerySystemTime
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
_stricmp
ZwQueryInformationFile
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
IofCallDriver
IoBuildDeviceIoControlRequest
ZwFsControlFile
ZwQueryVolumeInformationFile
_allmul
_alldiv
ZwSetInformationFile
ZwReadFile
RtlImageDirectoryEntryToData
KeGetCurrentThread
IoGetCurrentProcess
MmHighestUserAddress
memcpy
ZwQuerySystemInformation
ZwQueryInformationProcess
RtlEqualUnicodeString
strcmp
KeUnstackDetachProcess
KeStackAttachProcess
PsLookupProcessByProcessId
ZwQueryObject
wcscat
_except_handler3
_alloca_probe
KeRevertToUserAffinityThread
KeSetSystemAffinityThread
KeQueryActiveProcessors
IoFreeIrp
IoAllocateIrp
IoGetRelatedDeviceObject
IoFreeMdl
MmUnlockPages
MmProbeAndLockPages
MmBuildMdlForNonPagedPool
IoAllocateMdl
KeInsertQueueApc
KeInitializeApc
ZwAllocateVirtualMemory
PsGetProcessImageFileName
_wcsupr
ObMakeTemporaryObject
ObfReferenceObject
MmUnmapLockedPages
strncpy
strstr
IoFileObjectType
strcat
strchr
MmIsAddressValid
PsGetCurrentThreadId
FsRtlIsNameInExpression
PsLookupThreadByThreadId
memset
strcpy
ExFreePoolWithTag
hal
KfReleaseSpinLock
KfAcquireSpinLock
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 35KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ