Static task
static1
General
-
Target
a2c1d19586b0d3d7b51b9f2915e73eb4_JaffaCakes118
-
Size
7KB
-
MD5
a2c1d19586b0d3d7b51b9f2915e73eb4
-
SHA1
0ecff62dc0e3cde34e2d8c43dc1e9f067ce20b29
-
SHA256
b213419ddf3d45fa7571177c60f1bcb4be83b15ab1e8ff45651c266d7a62d5cb
-
SHA512
e4cbdd0cca0b305ab539fbf35f58e9d56e1f7265100915131241dba732de2e371a3f935716a44032b330b8316da864ab3ebe8570696a20010194cf4571bc0781
-
SSDEEP
96:/COOxyf7JnKfswaRzdVoTO4bS7ozeRJ8gsfnXwrtWU1s3LcAbVnzZSmJ9I0X6cbR:N8yf9nKfktdVoTOw8sfnA5E1ZSy1XDP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2c1d19586b0d3d7b51b9f2915e73eb4_JaffaCakes118
Files
-
a2c1d19586b0d3d7b51b9f2915e73eb4_JaffaCakes118.sys windows:4 windows x86 arch:x86
0681f6477aeb5225bc30512099859f31
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoDeleteSymbolicLink
RtlAnsiStringToUnicodeString
RtlInitAnsiString
MmGetSystemRoutineAddress
IoGetDeviceObjectPointer
ObfDereferenceObject
memcpy
KeWaitForSingleObject
IofCallDriver
IoBuildSynchronousFsdRequest
KeInitializeEvent
RtlFreeUnicodeString
memset
sprintf
_except_handler3
IofCompleteRequest
RtlEqualUnicodeString
IoCreateSymbolicLink
IoCreateDevice
IoDeleteDevice
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 576B - Virtual size: 566B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 544B - Virtual size: 542B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ