Static task
static1
General
-
Target
d566a3613ce9b0fc3472006696bc5ec1_JaffaCakes118
-
Size
40KB
-
MD5
d566a3613ce9b0fc3472006696bc5ec1
-
SHA1
b228b341d3de42d925b7adc29b58f7f7ad5af4c4
-
SHA256
c811bc7e3f96ff41b72959289d62da38637f2b8adee62b04da9d46483c1bab9c
-
SHA512
7fdec5b85f85aa2933485ab6f432d88b8e6751dcc35851c4fddfd6866b12e4782fcdd5778b7134db98e450acefb7f965047233d3bf29cc89b40bbc798bcef417
-
SSDEEP
768:6xxoBSF0OphFQjp82G2BECpQOcNrC2K+hUhzu/s6y9fZInrmsS+OGs563:eO/OphFD2GFwcNMu06UfKvS+dsA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d566a3613ce9b0fc3472006696bc5ec1_JaffaCakes118
Files
-
d566a3613ce9b0fc3472006696bc5ec1_JaffaCakes118.sys windows:4 windows x86 arch:x86
3e63b25266a612fb4634c77c412847d3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwQueryValueKey
RtlInitUnicodeString
MmGetSystemRoutineAddress
_wcsicmp
wcsncpy
wcslen
wcsrchr
ExFreePool
ExAllocatePoolWithTag
ObfDereferenceObject
MmIsAddressValid
KeTickCount
KeQueryTimeIncrement
_stricmp
swprintf
ZwOpenKey
ZwSetValueKey
ZwCreateKey
ObReferenceObjectByHandle
_snwprintf
wcschr
PsCreateSystemThread
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
ZwCreateFile
ZwSetInformationFile
wcscpy
KeQuerySystemTime
IoGetCurrentProcess
PsGetVersion
strncpy
PsLookupProcessByProcessId
IoDeviceObjectType
wcsstr
_wcslwr
_except_handler3
strncmp
IofCompleteRequest
RtlCompareUnicodeString
RtlAnsiStringToUnicodeString
wcscat
_snprintf
_wcsnicmp
ZwDeleteKey
IoRegisterDriverReinitialization
KeDelayExecutionThread
RtlCopyUnicodeString
PsSetCreateProcessNotifyRoutine
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 37B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ