Static task
static1
General
-
Target
b767dd07533a2b77922ae88dcb20e276_JaffaCakes118
-
Size
88KB
-
MD5
b767dd07533a2b77922ae88dcb20e276
-
SHA1
2c0b217ad5bd528e384717d4b0b0fa2d0a6e150a
-
SHA256
74df3d0862ce3f2f4e3011373de338821605b8be1258bb1b8e5a643042f5b8f3
-
SHA512
54f977190a210ceb8dc005c99536be85c836fdfc7d5fa573a1a2da05c0853c739c1173054c9dd802d0ec8f259601df160ce142e50b7cefb61465d655c0c65ece
-
SSDEEP
1536:XI8D88Rt+b+Pojamht8WdVlVjtCJL3BrtjrzCBeOUnmZjY4Ke3Jj9UvbPjHiY9qO:YNWjPotZnp8xrtjrzgUwjdLJjUrXqSHp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b767dd07533a2b77922ae88dcb20e276_JaffaCakes118
Files
-
b767dd07533a2b77922ae88dcb20e276_JaffaCakes118.sys windows:5 windows x86 arch:x86
e9d42bf82e32603452fa8918df296e1e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoDeleteDevice
IoAllocateIrp
ExFreePoolWithTag
IofCallDriver
DbgPrint
ExAllocatePoolWithTag
IoGetRelatedDeviceObject
KeWaitForSingleObject
KeSetEvent
IoFreeIrp
IoFreeWorkItem
IoAllocateMdl
IoFreeMdl
KeInitializeMutex
IofCompleteRequest
ObfReferenceObject
memset
memcpy
IoAllocateWorkItem
IoAttachDevice
KeInitializeEvent
hal
ExAcquireFastMutex
ExReleaseFastMutex
Sections
.text Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 640B - Virtual size: 600B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 322B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ