Static task
static1
General
-
Target
c79dda4e56b76c6c2ec3dd6afbe4f4f5_JaffaCakes118
-
Size
40KB
-
MD5
c79dda4e56b76c6c2ec3dd6afbe4f4f5
-
SHA1
e1eb01fd38556cba5a4dc07b4c69a74fee404b4d
-
SHA256
07586aac219da0d77a7072af9a47f50bb03e1a1f1aea5e859ae0cfa1d0f8ca4f
-
SHA512
65ec3eb2973e823e7bc280e36c9237eeb4db9807aacfa032ac026e0a45cb2e6a0c988ffdb52638ea5d8dc7f178e01022d05d1dc1fd16bf62f4284193a9976ada
-
SSDEEP
768:hXHC6PoSfD2DF1AVrxEzgPGIXwmmMwo6cAZO1zBkEQMc7iZ:hXClIqpkrCzgPGXmTwo6YxBW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c79dda4e56b76c6c2ec3dd6afbe4f4f5_JaffaCakes118
Files
-
c79dda4e56b76c6c2ec3dd6afbe4f4f5_JaffaCakes118.sys windows:4 windows x86 arch:x86
6f2b15611b1529399629c49c86f40ae4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
swprintf
ZwSetValueKey
ZwClose
ZwQueryValueKey
RtlInitUnicodeString
ZwOpenKey
_except_handler3
ExFreePool
_snprintf
ExAllocatePoolWithTag
MmIsAddressValid
IoDeviceObjectType
ZwSetInformationFile
ZwCreateFile
wcslen
wcscpy
strncmp
_wcsicmp
ZwCreateKey
strncpy
IoGetCurrentProcess
PsSetCreateProcessNotifyRoutine
wcsncpy
wcsrchr
KeTickCount
KeQueryTimeIncrement
_stricmp
ObfDereferenceObject
_snwprintf
wcschr
wcscat
ObReferenceObjectByHandle
IofCompleteRequest
ZwDeleteKey
RtlCompareUnicodeString
KeQuerySystemTime
IoRegisterDriverReinitialization
_wcsnicmp
RtlCopyUnicodeString
RtlAnsiStringToUnicodeString
PsGetVersion
PsCreateSystemThread
PsLookupProcessByProcessId
wcsstr
_wcslwr
MmGetSystemRoutineAddress
KeDelayExecutionThread
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 78B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ