Static task
static1
General
-
Target
b074f627d22b8b3fca01c151ace5a436_JaffaCakes118
-
Size
16KB
-
MD5
b074f627d22b8b3fca01c151ace5a436
-
SHA1
d4a67b5bb0dc1de77cfd97d37bfb25935fb4eaaa
-
SHA256
ece430caa4720bc431a43bb6dcd770cc144ac17c2ba135fb378772ef20d2fdd5
-
SHA512
49668133cb677906071799f1b95740826df01b6b2fd79c7eacb627ff9a3bc16b627f4a5b8db47c1ca3bf14b637c87b0359b3250000a0fe1b45706c6209d46eb4
-
SSDEEP
192:KSYiCeEjH4rxE3tQkhcyp4docoZ5keTbLI8DWrxW2yUc+op+ebCfbkQpkqs1INLd:KSZtre9VbncoZY8DWrxWjB/fbCD21cd
Malware Config
Signatures
Files
-
b074f627d22b8b3fca01c151ace5a436_JaffaCakes118.sys windows:5 windows x86 arch:x86
8802d930d353af5c9996e87e3990b0bf
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US67:24:34:0d:db:c7:25:2f:7f:b7:14:b8:12:a5:c0:4dCertificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before27/11/2009, 00:00Not After27/11/2011, 23:59SubjectCN=YNK JAPAN Inc,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=YNK JAPAN Inc,L=\ Nihonbashi Kodenmachou10-6,ST=Chuo-ku,C=JPExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
H:\CSDOWN~3\CS84F8~1\驱动保护\IOCREA~1\IOCREA~1\objfre\i386\IoCreateFileHook.pdb
Imports
ntoskrnl.exe
_wcsicmp
ExFreePoolWithTag
wcscpy
ExAllocatePoolWithTag
_stricmp
wcslen
MmIsAddressValid
IoGetCurrentProcess
ObfDereferenceObject
ObReferenceObjectByName
IoDriverObjectType
RtlInitUnicodeString
ZwClose
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
RtlEqualUnicodeString
RtlFreeUnicodeString
KeDelayExecutionThread
_allmul
IoDeleteDevice
IoDeleteSymbolicLink
ZwWaitForSingleObject
wcscat
IofCompleteRequest
PsTerminateSystemThread
PsCreateSystemThread
KeInitializeSpinLock
IoCreateSymbolicLink
IoCreateDevice
MmGetSystemRoutineAddress
KeServiceDescriptorTable
DbgPrint
ObReferenceObjectByHandle
KeGetCurrentThread
PsProcessType
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 281B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 922B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 944B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 896B - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ