Static task
static1
General
-
Target
94678f2b2bb0daafa36d82c45469c1c6_JaffaCakes118
-
Size
47KB
-
MD5
94678f2b2bb0daafa36d82c45469c1c6
-
SHA1
7d54aac11e0a9a7c15a16e1d173abeae472451e8
-
SHA256
8814b9bf61e50d4c9457ec81c7390c890a75356394f7c66afdc801ed3c7a3a36
-
SHA512
3000f321cfa0bf4df324bbaba6146128ea65dcab953000aebc80669584e0555497aac2a4a1ea4f7734abb6724c13d0832af15d0e3000b6d113e6712c6f5ae4e9
-
SSDEEP
768:D1AG7fHqDl5XQ+R7aZCkZI2I4U+qaXRrGIfCZ6KWg+Unpg:mESle+FaZCkZI2I3+qa1GIfCZzWxUp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 94678f2b2bb0daafa36d82c45469c1c6_JaffaCakes118
Files
-
94678f2b2bb0daafa36d82c45469c1c6_JaffaCakes118.sys windows:4 windows x86 arch:x86
b83c53de1942504218e8c8644ac66f1a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmGetSystemRoutineAddress
RtlInitUnicodeString
ZwClose
ZwCreateFile
MmIsAddressValid
swprintf
wcscat
wcscpy
_stricmp
strncpy
ExAllocatePoolWithTag
KeInitializeTimer
IofCompleteRequest
PsGetVersion
_wcslwr
wcsncpy
ZwCreateKey
wcslen
_snprintf
ExFreePool
ZwQuerySystemInformation
ZwMapViewOfSection
ZwCreateSection
ZwSetValueKey
ZwOpenKey
ZwEnumerateKey
ZwUnmapViewOfSection
strncmp
IoGetCurrentProcess
_wcsnicmp
RtlAnsiStringToUnicodeString
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 192B - Virtual size: 162B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 704B - Virtual size: 700B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 928B - Virtual size: 912B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 736B - Virtual size: 734B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ