Static task
static1
General
-
Target
ad3abed9366a336b77cd87847ca5e063_JaffaCakes118
-
Size
28KB
-
MD5
ad3abed9366a336b77cd87847ca5e063
-
SHA1
861702efeea5707149bc0848a0e26c8fec1c9ac6
-
SHA256
82114bd8f81d00a695c73b19ddf8931b478a3cfeb0cccc5ccf9311a4034ea914
-
SHA512
2c4e7e4374f40038ccf20a6a57ba4c667ed280d66e2a669ea0282202b285d6300eec7622e9427206d6887959b8915e26aaabf4185f179331fb4819c094d0b547
-
SSDEEP
768:+9ObE5qrzOXEWePEhHrmfRUHFjJjh34j:GqrzO0hEwfRUHFj734j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad3abed9366a336b77cd87847ca5e063_JaffaCakes118
Files
-
ad3abed9366a336b77cd87847ca5e063_JaffaCakes118.sys windows:4 windows x86 arch:x86
f0be6a7b39cc6de7910855df569126ab
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcslen
swprintf
RtlInitUnicodeString
wcscat
wcscpy
_stricmp
strncpy
RtlCopyUnicodeString
_strnicmp
_wcsnicmp
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
MmIsAddressValid
_except_handler3
ZwUnmapViewOfSection
IoGetCurrentProcess
strncmp
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
ObfDereferenceObject
ObQueryNameString
RtlAnsiStringToUnicodeString
IofCompleteRequest
MmGetSystemRoutineAddress
RtlCompareUnicodeString
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 704B - Virtual size: 686B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ