Static task
static1
General
-
Target
b3b59ba63ce2131c0f07dee1ccd246be_JaffaCakes118
-
Size
8KB
-
MD5
b3b59ba63ce2131c0f07dee1ccd246be
-
SHA1
7f2da20b0d36be49b9510280fd601c291edcd856
-
SHA256
2eafbefcf659510443f1538d651d7b5026e408f45e9e3681046565a9eec6bd29
-
SHA512
9c65920153837cfd2cca8c87aa63565d6f7ce0f670316515a09130df16bb0a74b7c063d2a45b34b80eaee17fa4fb7196fba91479ba6ee6e739c6864a4d96ba18
-
SSDEEP
192:BFzyS+dL352xyOW2+ksijy89mhtNJSIjWY83:BFzLiL3YkOPm89mXNAIyY83
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3b59ba63ce2131c0f07dee1ccd246be_JaffaCakes118
Files
-
b3b59ba63ce2131c0f07dee1ccd246be_JaffaCakes118.sys windows:5 windows x86 arch:x86
13842a1078af2668d6a845208b1aa31d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
memcpy
IoDeleteSymbolicLink
RtlInitUnicodeString
IoDeleteDevice
MmGetSystemRoutineAddress
PsTerminateSystemThread
IofCompleteRequest
PsGetVersion
KeServiceDescriptorTable
ObfReferenceObject
IoCreateSymbolicLink
ObfDereferenceObject
IoCreateDevice
_except_handler3
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 418B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 174B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ