Static task
static1
General
-
Target
cf14f52d3cc1b274cbfa5eb149d49178_JaffaCakes118
-
Size
4KB
-
MD5
cf14f52d3cc1b274cbfa5eb149d49178
-
SHA1
c75c666d55cf501ff39dd1ad60bcf6f195d5fdd6
-
SHA256
aa871c058b7dd439ac020d9f35415fe4c7c110f14169a995910a074c959c275f
-
SHA512
f7d1f50cdd4da8dfc3abcb269b5141ef15617109f634fc26db5ff4e121cdab096dec3e8fbaa1b544437a1deb4c5ca0e1dee6b42fee45e934f7ade54dbbb9f064
-
SSDEEP
48:ioUCyeo4Nv0pn84cCCLkwevTjIMbvMyud/bf3zlZrFVBynEve6Rrdw/swHX9ETVp:Rro+Mp84+Lk9OjXrnBp/w/sw39mZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cf14f52d3cc1b274cbfa5eb149d49178_JaffaCakes118
Files
-
cf14f52d3cc1b274cbfa5eb149d49178_JaffaCakes118.sys windows:4 windows x86 arch:x86
cdab88fe925b8651fe8f34e7ff86924f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
IoGetDeviceObjectPointer
IoRegisterDriverReinitialization
ObDereferenceObject
ObReferenceObjectByHandle
ObReferenceObjectByName
ZwAccessCheckAndAuditAlarm
ZwClose
ZwOpenDirectoryObject
MmUserProbeAddress
KeServiceDescriptorTable
IoDriverObjectType
DbgPrint
IofCompleteRequest
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 544B - Virtual size: 520B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 160B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ