Static task
static1
General
-
Target
bc0d032cc64e67b00e5e2663e633ec3d_JaffaCakes118
-
Size
110KB
-
MD5
bc0d032cc64e67b00e5e2663e633ec3d
-
SHA1
4ce12eb2d161d7e41491a1953f68df91cd8794b0
-
SHA256
af577a00dcec1ce87cf9ab0d76330bad4bac42a9339f22544db75e323a68c198
-
SHA512
521474bcb46c2e7b3c3714a21c5ad47a5ded1cf8aaf3dd4be1ad4fc45edae0ef885cca6f24dd8b60ed270528e9f6270be7cfaa6c5ef2907e605df9f13d85e21a
-
SSDEEP
3072:H4ntzwAGf81Knbz0lvdGFbsfGq6nKthP/:H4ziHQf/SKf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc0d032cc64e67b00e5e2663e633ec3d_JaffaCakes118
Files
-
bc0d032cc64e67b00e5e2663e633ec3d_JaffaCakes118.sys windows:4 windows x86 arch:x86
9e6d2653b60b8a11d84817086e025322
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strlen
ZwClose
ZwWriteFile
ZwCreateFile
RtlInitUnicodeString
strncmp
PsGetProcessImageFileName
PsLookupProcessByProcessId
ZwSetValueKey
ZwCreateKey
memset
ExAllocatePoolWithTag
memcpy
ExFreePoolWithTag
ObQueryNameString
ObfDereferenceObject
ObReferenceObjectByHandle
MmIsAddressValid
ZwOpenFile
IofCompleteRequest
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 502B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 416B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ