Static task
static1
General
-
Target
ada18745e370a442d14887508b5870a9_JaffaCakes118
-
Size
40KB
-
MD5
ada18745e370a442d14887508b5870a9
-
SHA1
1d1a784570ad5f1fa8cf0d085792dfe46491f421
-
SHA256
6cbbe32df7ec31367bc0f53ffef40a10dacb2c89e9385433a281675cc7819117
-
SHA512
fc1f30fbe21c2d244a4ac921b9869b430de1a891014309e128a495426c031536116662d1f6cb8e79e600997d04b40272d7da2887380bdfe1181233f56dc2527b
-
SSDEEP
768:Rs4topcHtnBpcFZej80GYRUyyeblfr2WcIy6RYdIhz2nfjXmCWr4:OrpaBpcFZeQtY6yXblnlRYS2nTmCWr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ada18745e370a442d14887508b5870a9_JaffaCakes118
Files
-
ada18745e370a442d14887508b5870a9_JaffaCakes118.sys windows:4 windows x86 arch:x86
d48eeeea567b058e33a786bb00db2c0e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_wcsnicmp
wcslen
RtlInitUnicodeString
ObfDereferenceObject
MmIsAddressValid
IoDeviceObjectType
ZwClose
swprintf
ZwOpenKey
MmGetSystemRoutineAddress
PsGetVersion
strncpy
IoGetCurrentProcess
ZwQueryValueKey
KeQuerySystemTime
RtlCompareUnicodeString
ZwDeleteKey
ExFreePool
_snprintf
ExAllocatePoolWithTag
ZwSetValueKey
IofCompleteRequest
PsCreateSystemThread
ZwSetInformationFile
ZwCreateFile
wcscpy
ObReferenceObjectByHandle
wcsncpy
wcsrchr
_stricmp
wcsstr
_wcslwr
ZwCreateKey
_snwprintf
PsSetCreateProcessNotifyRoutine
strncmp
KeDelayExecutionThread
_except_handler3
wcschr
_wcsicmp
IoRegisterDriverReinitialization
wcscat
PsLookupProcessByProcessId
KeTickCount
KeQueryTimeIncrement
RtlCopyUnicodeString
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlAnsiStringToUnicodeString
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 59B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ