General
-
Target
c08ce885a62f4ca95e2b8d4002d424dd_JaffaCakes118
-
Size
64KB
-
MD5
c08ce885a62f4ca95e2b8d4002d424dd
-
SHA1
efd8f34f7a519dc6161880bde053a5bd773a1e7d
-
SHA256
c5f8132781fe58db37899820e4fa801e8aedebdddbfc43d9d71945a443228117
-
SHA512
83ae2d2d17c6ae2acc4f1c58618006a449500b6b365d21a6676755b3273de7b7ede85c653bc374936374573d3b8f40055c37c00dd45a4ec060b3794ea7d6e197
-
SSDEEP
1536:JZuQpzKNzeQJHXIZVJGYygL4N4hh4y06+F8S:G+QJHXI15yk4e038
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c08ce885a62f4ca95e2b8d4002d424dd_JaffaCakes118
Files
-
c08ce885a62f4ca95e2b8d4002d424dd_JaffaCakes118.sys windows:5 windows x86 arch:x86
634a30da86978433ecd692bb74afc2dc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExAllocatePoolWithTag
ZwReadFile
ExGetPreviousMode
DbgBreakPointWithStatus
ZwSetValueKey
ZwSaveKey
KeDelayExecutionThread
ZwCreateFile
PsCreateSystemThread
DbgBreakPoint
ZwQueryValueKey
ZwQueryDirectoryFile
ZwQueryInformationProcess
ZwCreateSection
ZwQueryInformationFile
ZwDeleteKey
DbgPrint
ZwEnumerateKey
ExFreePoolWithTag
_wcsnicmp
ZwWriteFile
ObQueryNameString
IoGetCurrentProcess
MmMapViewOfSection
ObReferenceObjectByHandle
KeAttachProcess
ZwOpenProcess
KeServiceDescriptorTable
PsGetCurrentProcessId
MmIsAddressValid
ObfDereferenceObject
MmSectionObjectType
ZwOpenKey
NtWriteFile
MmUnmapViewOfSection
NtSetInformationFile
NtQueryInformationFile
ZwSetInformationFile
NtClose
RtlCompareUnicodeString
NtReadFile
ZwClose
IoCreateFile
KeDetachProcess
RtlInitUnicodeString
_except_handler3
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 1024B - Virtual size: 776B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ