Static task
static1
General
-
Target
dd3562de84350609462b01c8d0f0dbf6_JaffaCakes118
-
Size
314KB
-
MD5
dd3562de84350609462b01c8d0f0dbf6
-
SHA1
5647605e0188052589430647f7d6e80477831187
-
SHA256
c8c6ff5b11e8780314172c0536d3b910901d505b5691c4a57dd589b5bf7befe1
-
SHA512
34de08423e3dd1d70b983bbc52ddf48a8f611d7abeb0d98a1edb8c8968633e7e9a71bea65f5ab20f4a6c8640df162c5137178b708da186e74956768cec8936cc
-
SSDEEP
1536:j67J0Hu9uYFlC81fthVFgs1qkwpMh9K1Ioxaz1LVLMKJ6fEgEQuUqv7uXMP48UQt:CQ8Vt/JqkC5MRVIrf9tU7pPrvt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd3562de84350609462b01c8d0f0dbf6_JaffaCakes118
Files
-
dd3562de84350609462b01c8d0f0dbf6_JaffaCakes118.sys windows:5 windows x86 arch:x86
0bdf609479ae7eff512b0173aebae1d1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strcmp
RtlFreeAnsiString
RtlEqualUnicodeString
RtlUnicodeStringToAnsiString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
memcpy
ExAllocatePool
NtLockFile
Sections
.text Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96B - Virtual size: 82B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 288B - Virtual size: 274B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 320B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ