Static task
static1
General
-
Target
d57d50456c9d4f4a820c51567da9c505_JaffaCakes118
-
Size
64KB
-
MD5
d57d50456c9d4f4a820c51567da9c505
-
SHA1
272980a6fca34126653e31eaa825049890d525b9
-
SHA256
fded91f912f2de2b822206d6fdc67aaed8cb6aa9cb3dfeae07897aa66ba38939
-
SHA512
679b4b9c7273cc652174a88fd8e25a6ce294a1348f2599c2cf2dd7c5743e20bc769c08dec7474064adcb552bce441e93bb9427d584237909fca3cc5aa95d5bdf
-
SSDEEP
1536:Tnl3kLoAx3lWpU2odyMAp0ibqXXBRcWQUOCxb9gSj45vH2ZL33esjH/A/:p3kU83e1MApRbwBRcWVOC745+B33esjf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d57d50456c9d4f4a820c51567da9c505_JaffaCakes118
Files
-
d57d50456c9d4f4a820c51567da9c505_JaffaCakes118.sys windows:4 windows x86 arch:x86
9ff0786d073d4131f25a84422ec37864
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
hal
KeGetCurrentIrql
ntoskrnl.exe
IoValidateDeviceIoControlAccess
KeSetTimer
MmUnlockPagableImageSection
KeRemoveQueueDpc
KeCancelTimer
InterlockedDecrement
_alldiv
RtlEqualUnicodeString
ExAllocatePoolWithQuota
MmUnmapLockedPages
IoCancelIrp
ExQueueWorkItem
FsRtlMdlReadComplete
KeDetachProcess
FsRtlMdlRead
KeAttachProcess
IoGetRequestorProcess
FsRtlCopyRead
IoQueryFileInformation
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 768B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.INIT Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ