Static task
static1
General
-
Target
d034b091936ac6fb560ee4f9c1c98d34_JaffaCakes118
-
Size
13KB
-
MD5
d034b091936ac6fb560ee4f9c1c98d34
-
SHA1
c7e77b002855008eed2e5b0c8084cd26c7b92170
-
SHA256
896b0c21fa2fcabdd99cb756be104856a8c2f002a57c06bb202c40ffb5a065ef
-
SHA512
acd8b57ecf2ad72de4cca224d60942fa8601eeda63cbc5063015b6f0e31ad6c14434a07fb3ab53d8d8202d8cbaffa3bd31faca3e1319c68d24a41c7d18b8e401
-
SSDEEP
192:9mDr+9sHLgQS04tfMbnYOSMJQa3ufzduxirDtNbeQ:ar+yS04Rs/Wa+fJuxirDj6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d034b091936ac6fb560ee4f9c1c98d34_JaffaCakes118
Files
-
d034b091936ac6fb560ee4f9c1c98d34_JaffaCakes118.sys windows:5 windows x86 arch:x86
34103091fd018d7560a73ada441f1da7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
IofCompleteRequest
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
ExAllocatePoolWithTag
MmSizeOfMdl
ZwQueryInformationProcess
PsGetCurrentProcessId
ExGetPreviousMode
ProbeForWrite
ProbeForRead
_strupr
RtlFreeAnsiString
_strlwr
strrchr
RtlUnicodeStringToAnsiString
MmIsAddressValid
_except_handler3
KeUnstackDetachProcess
ZwTerminateProcess
KeStackAttachProcess
PsLookupProcessByProcessId
PsTerminateSystemThread
ExFreePool
ZwQuerySystemInformation
ZwPulseEvent
MmGetSystemRoutineAddress
PsSetLoadImageNotifyRoutine
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 800B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 930B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 448B - Virtual size: 420B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ