Static task
static1
General
-
Target
ae6def75c64fe10eae448ebf67518246_JaffaCakes118
-
Size
2KB
-
MD5
ae6def75c64fe10eae448ebf67518246
-
SHA1
abdca7509ad8fc0fb61bb42f331f20bf496eed65
-
SHA256
48336f8b8142dc5795cb1cd40d5d97af4431195671ff8783fa16145a8bd3a4ec
-
SHA512
18bb67b22ca62a7c14777cf8d66b753ab7439afa81bf5eb4daadd17ff960c2bb73595cf2b23d72061a9a688c58d87ceff828f12b79a874323436929539a27ade
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae6def75c64fe10eae448ebf67518246_JaffaCakes118
Files
-
ae6def75c64fe10eae448ebf67518246_JaffaCakes118.sys windows:5 windows x86 arch:x86
a2c28b60abc748f188232ead2801b069
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeSetEvent
KeDelayExecutionThread
memmove
RtlFreeAnsiString
KeWaitForSingleObject
ObfDereferenceObject
RtlUnicodeStringToAnsiString
ObReferenceObjectByHandle
IofCompleteRequest
MmUnmapIoSpace
MmMapIoSpace
MmGetPhysicalAddress
KeServiceDescriptorTable
KeInitializeEvent
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
Sections
.text Size: 864B - Virtual size: 837B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 498B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ