XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Static task
static1
General
-
Target
d32868fe88d7b79cfbbf09150c0d0778_JaffaCakes118
-
Size
6KB
-
MD5
d32868fe88d7b79cfbbf09150c0d0778
-
SHA1
cf7e1d250f89bb6d8e8527dbe39da0659704d791
-
SHA256
d0ea6eb231e3a60cfed8765c13c270dff003e2dfae0ffb1d846fd5f4afb0f950
-
SHA512
7fdbb8d74e2652cc426d4f9271fa804f8380dcfd20db4053b1df6545f27a47d3165c2a30096c5000856e0ec9907dd082372719412d705a0320554131d2e770a6
-
SSDEEP
96:N2ni7MwvFAv6FzwS4X6P1If9nnOFF8JgXh+SMCT+l3SBpAKtMz5Y:maMF6F8bf9nuikhdiZKKY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d32868fe88d7b79cfbbf09150c0d0778_JaffaCakes118
Files
-
d32868fe88d7b79cfbbf09150c0d0778_JaffaCakes118.sys windows:5 windows x86 arch:x86
bb987107c12db4043bce620809ac5191
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwCreateJobObject
ObOpenObjectByPointer
_except_handler3
IoCreateFile
RtlInitUnicodeString
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
IofCallDriver
RtlAssert
KeGetCurrentThread
KeInitializeEvent
ObfDereferenceObject
IoAllocateIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
MmUnmapViewOfSection
ZwClose
ZwSetValueKey
wcslen
ZwOpenKey
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
ZwCreateKey
RtlInitAnsiString
IoCreateSymbolicLink
DbgPrint
IoCreateDevice
KeDetachProcess
ZwTerminateProcess
KeAttachProcess
IofCompleteRequest
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
IoDeleteDevice
IoDeleteSymbolicLink
PsLookupProcessByProcessId
hal
KeGetCurrentIrql
Sections
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ