Static task
static1
General
-
Target
a4ea1bc1af5ec01011373310392cb878_JaffaCakes118
-
Size
20KB
-
MD5
a4ea1bc1af5ec01011373310392cb878
-
SHA1
38ef776242106fad5cc5d16eb84a30f48501c190
-
SHA256
499147a7aae9d6399eb537dd5ce72adf065f0e0587cce456fb293abee517b8dc
-
SHA512
24b9e912ae2662744a3fa5dab1cec0c2c8172968f4e65716087cff6fb515a4f95e876ea698b7a339c48e55a58c8cd09c732799bfc303c8def523123b0ac70513
-
SSDEEP
384:GglLHqvdZIZF2DTGdJKkphkMJFZl6FFr+TcH1am1E:GgVPk45uVa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a4ea1bc1af5ec01011373310392cb878_JaffaCakes118
Files
-
a4ea1bc1af5ec01011373310392cb878_JaffaCakes118.sys windows:4 windows x86 arch:x86
ba692d3ad51781ee11b0fdddee4ef37c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
IoCreateDevice
IoCreateSymbolicLink
IofCompleteRequest
KeServiceDescriptorTable
ZwWriteFile
ZwTerminateProcess
ZwSetValueKey
ZwReadFile
ZwQueryInformationProcess
ZwQueryInformationFile
ZwQueryDirectoryFile
ZwOpenThread
ZwOpenProcess
ZwCreateKey
ZwCreateFile
ZwClose
ZwAllocateVirtualMemory
RtlCompareUnicodeString
NtLockFile
_strnicmp
PsLookupProcessByProcessId
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 864B - Virtual size: 862B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 592B - Virtual size: 586B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ