Static task
static1
General
-
Target
b3a794316794cada4fa1c9473400d584_JaffaCakes118
-
Size
28KB
-
MD5
b3a794316794cada4fa1c9473400d584
-
SHA1
c80311dfdca861ed6836336b46bd7187bf32d844
-
SHA256
c34607d69cc1b4db35b01b90eed4c8a7351ae18200134f051e081502062c6e45
-
SHA512
f2b3195d3ff134aea4503ca460d11ce980583983158bb0c87fc2e728a71d916d47917122eff581d330fe2f89e6b6ac1cc2887ae1ba792c849b4b56f7863e5d8a
-
SSDEEP
768:XljSPFspSYGYqmphZx6zB3LiYFvAg9bdrtYm:qFSSfY9phZxQB3eYFtldrtYm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b3a794316794cada4fa1c9473400d584_JaffaCakes118
Files
-
b3a794316794cada4fa1c9473400d584_JaffaCakes118.sys windows:4 windows x86 arch:x86
49c5c85e98dd22831730257e594d5131
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcscat
swprintf
RtlCompareUnicodeString
RtlInitUnicodeString
_stricmp
MmIsAddressValid
_strnicmp
RtlAnsiStringToUnicodeString
wcslen
_except_handler3
IofCompleteRequest
MmGetSystemRoutineAddress
_snprintf
ExFreePool
ExAllocatePoolWithTag
ZwQuerySystemInformation
ObfDereferenceObject
ObQueryNameString
ZwUnmapViewOfSection
strncpy
IoGetCurrentProcess
wcscpy
RtlCopyUnicodeString
strncmp
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
_wcsnicmp
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 704B - Virtual size: 686B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ