Static task
static1
General
-
Target
8dff25c096b760160d364ec0f53a16e7_JaffaCakes118
-
Size
9KB
-
MD5
8dff25c096b760160d364ec0f53a16e7
-
SHA1
60ae605f6e4ee8ee8fd0be39eaba42d2e18bb14e
-
SHA256
fc29800b98c0cbd486f1a85fddf091deb1a06d6e35dc1bdc96c316751bc7852f
-
SHA512
81feee97f17e3b5644ec350719ed481d1ed9b91555b1f4e4355680e0d60912105aa470318866f35ad0c5939c9f72569965d6437cec0998ab0dbbf8782b5ccaad
-
SSDEEP
192:gLKhANh1pcxt9ZGna4CL8ukEdsn/EnOP9h+Pmf5gR5jvgB:mKhgfcfyukesm45gb7u
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8dff25c096b760160d364ec0f53a16e7_JaffaCakes118
Files
-
8dff25c096b760160d364ec0f53a16e7_JaffaCakes118.sys windows:4 windows x86 arch:x86
8add9ea6acf34ef487596288d652722c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
KeDelayExecutionThread
ZwCreateKey
ZwClose
wcslen
swprintf
wcscat
wcscpy
strncmp
IoGetCurrentProcess
ZwOpenKey
ZwEnumerateKey
ZwSetValueKey
ZwCreateFile
_wcslwr
wcsncpy
PsGetVersion
MmIsAddressValid
IoRegisterDriverReinitialization
PsTerminateSystemThread
PsCreateSystemThread
_stricmp
strncpy
PsLookupProcessByProcessId
ExAllocatePoolWithTag
KeInitializeTimer
PsSetCreateProcessNotifyRoutine
DbgPrint
RtlAnsiStringToUnicodeString
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ZwUnmapViewOfSection
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 860B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 558B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ