Static task
static1
General
-
Target
b924676dca97dd93964fda8306942adc_JaffaCakes118
-
Size
9KB
-
MD5
b924676dca97dd93964fda8306942adc
-
SHA1
04f993ffd30723deded02f5adca559f4313edfff
-
SHA256
301fe392ff8bf43c867782867cc950fa1f245125e6f7572fb00d78e5499ef399
-
SHA512
464480d3a36b7d72f075f9f2a688123cab7390207ab6b029783f032afe0cd6dbeb669abeadb56f36379b20a137e1d488d1196361758c97c37c05ef8bdcb2b64b
-
SSDEEP
192:ThihTkKZybMgqW4DLaHTMf+4IkcopwtLgIs3CME:UhObMgoXJm4LqxZ
Malware Config
Signatures
Files
-
b924676dca97dd93964fda8306942adc_JaffaCakes118.sys windows:5 windows x86 arch:x86
b7a9ada452380dbef2c10f17db0ca25c
Code Sign
09:35:77:6f:cd:60:c4:8a:43:24:39:26:7b:b7:44:bcCertificate
IssuerCN=VeriSign Class 3 Code Signing 2004 CANot Before14/02/2012, 08:40Not After31/12/2039, 23:59SubjectCN=Tencent Technology(Shenzhen) Company LimitedSigner
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
_except_handler3
IoCreateFile
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
IofCallDriver
KeGetCurrentThread
KeInitializeEvent
ObfDereferenceObject
IoAllocateIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
MmGetSystemRoutineAddress
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
IofCompleteRequest
ZwClose
KeServiceDescriptorTable
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
wcslen
hal
KeGetCurrentIrql
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 890B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 274B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ