Static task
static1
General
-
Target
de7fec41e828886d5a6c43db7a2621fe_JaffaCakes118
-
Size
4KB
-
MD5
de7fec41e828886d5a6c43db7a2621fe
-
SHA1
0c725bb4403dab2d71b136deeef338e63e24600d
-
SHA256
4a453956d770d79ecd075b53009d340157d889d5e0b2369129611eb2d5d6c1fc
-
SHA512
62d7dd4b1da23af3bddd6959c06ea58e0a20094c92373773145ff5f8c19798e0d2c5dabbc0f41c5528766cf3859a34fede63ad2602a202df638aae0a781184ae
-
SSDEEP
48:ioDpjulJQ15R/X2oYuiLXRCwVo811KCo+sjIZWQ7q2ue5WwGD+:JpyQ2uiLXPnKX+MEWKLu+Ww8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de7fec41e828886d5a6c43db7a2621fe_JaffaCakes118
Files
-
de7fec41e828886d5a6c43db7a2621fe_JaffaCakes118.sys windows:5 windows x86 arch:x86
7482844e73a5d53a290934fbdb3d17b1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
IoCreateSymbolicLink
DbgPrint
IoCreateDevice
RtlInitUnicodeString
IofCompleteRequest
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 608B - Virtual size: 608B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 160B - Virtual size: 148B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 352B - Virtual size: 324B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 96B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ