Static task
static1
General
-
Target
ce6821dd4afbfcc69f29e965d68c6821_JaffaCakes118
-
Size
28KB
-
MD5
ce6821dd4afbfcc69f29e965d68c6821
-
SHA1
d9d6ff37b6f5747e85956387c05df44af225bc53
-
SHA256
fe266a4cf79047fa807d44ec147c8c115ee23789e2d25e33fdb268ca4b6c950e
-
SHA512
920d4fcc80e3d97e0e17199a7166b723c3bff5c85d4f83a8941dc629444a9620ee5de83e1f47925d1322f58e243722b778a4fa97bfca2ebb556b447cfc6011d8
-
SSDEEP
768:V3GkmylwZyKecKDZZpk2ou1+TCq/Go2K2mIu7Q:V3uylwDHr1Cc2K77Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce6821dd4afbfcc69f29e965d68c6821_JaffaCakes118
Files
-
ce6821dd4afbfcc69f29e965d68c6821_JaffaCakes118.sys windows:4 windows x86 arch:x86
429ce001e44eef22db8032c924c52c1d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IofCompleteRequest
RtlInitUnicodeString
RtlCompareUnicodeString
wcscat
swprintf
ZwUnmapViewOfSection
wcscpy
_stricmp
wcslen
strncpy
IoGetCurrentProcess
RtlAnsiStringToUnicodeString
strncmp
_wcsnicmp
_strnicmp
MmIsAddressValid
ExFreePool
ExAllocatePoolWithTag
ZwMapViewOfSection
ZwCreateSection
ZwOpenFile
_except_handler3
ObfDereferenceObject
ObQueryNameString
MmGetSystemRoutineAddress
_snprintf
ZwQuerySystemInformation
RtlCopyUnicodeString
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 704B - Virtual size: 686B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ