Static task
static1
General
-
Target
ddaa473de87d5fb20aef10710be3c01c_JaffaCakes118
-
Size
13KB
-
MD5
ddaa473de87d5fb20aef10710be3c01c
-
SHA1
f1faaaa358004bdcff3aa8cc76629201aa23bb0b
-
SHA256
caba3a751f714b8f7c80bca623c9dc1fd8ade1a875584cb2515f5fc81185969d
-
SHA512
9c96d38ebaaede624114eb892e7c8e296be6d36f8242a0e92bd984d287ce73ff7cd52c419115575a16bb0e923226e1ba24c49b446f15d6d20453a3619dc1b13c
-
SSDEEP
192:u+9snfsQazYzENvBe2+KO2XX8owLTBUB56:u+eh4u2+KX8owLTBUB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ddaa473de87d5fb20aef10710be3c01c_JaffaCakes118
Files
-
ddaa473de87d5fb20aef10710be3c01c_JaffaCakes118.sys windows:5 windows x86 arch:x86
0c35d32418dc3aebd156aa05bcb2eba2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
strncmp
IoGetCurrentProcess
IofCompleteRequest
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
ExAllocatePoolWithTag
MmSizeOfMdl
ZwQueryInformationProcess
PsGetCurrentProcessId
ExGetPreviousMode
ProbeForWrite
ProbeForRead
_stricmp
_strupr
RtlFreeAnsiString
_strlwr
strrchr
RtlUnicodeStringToAnsiString
MmIsAddressValid
_except_handler3
KeUnstackDetachProcess
ZwTerminateProcess
KeStackAttachProcess
PsLookupProcessByProcessId
PsTerminateSystemThread
ExFreePool
ZwQuerySystemInformation
ZwPulseEvent
MmGetSystemRoutineAddress
PsSetLoadImageNotifyRoutine
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 864B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 960B - Virtual size: 946B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 448B - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ