Static task
static1
General
-
Target
b4d20047efc1321a13a8742abffe9720_JaffaCakes118
-
Size
28KB
-
MD5
b4d20047efc1321a13a8742abffe9720
-
SHA1
85385f3ef8d543425dc4f170dc3147517dae861b
-
SHA256
36f867bed26e8c9061700f76772a19f2c39079ab685fbdef3a6eb1ed64377a0f
-
SHA512
f3a9141d23d75d1452abb6832ab621897736ef62e4189d6094dd53bedf0f0d0e955e44b33dd982d6c4e772235bd292ac066c1e611f2e6ac893d80b2ce8fddef6
-
SSDEEP
768:TQbTBKXaJZziFO9fNr++1TMtLNIQN2gzTgVqLqwe:TITEXaJZmF6r++1SxI22gwshe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4d20047efc1321a13a8742abffe9720_JaffaCakes118
Files
-
b4d20047efc1321a13a8742abffe9720_JaffaCakes118.sys windows:4 windows x86 arch:x86
5ae23e374fc688883ed3d17dd810ceae
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
_strnicmp
strncpy
RtlInitUnicodeString
RtlAnsiStringToUnicodeString
ZwClose
ZwOpenKey
IofCompleteRequest
swprintf
MmGetSystemRoutineAddress
_wcsnicmp
wcslen
wcscat
wcscpy
RtlCopyUnicodeString
_stricmp
ExFreePool
_snprintf
ExAllocatePoolWithTag
strncmp
ObfDereferenceObject
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 832B - Virtual size: 814B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ