Static task
static1
General
-
Target
df4ba9ffa91b755adf67cb6464cb9844_JaffaCakes118
-
Size
24KB
-
MD5
df4ba9ffa91b755adf67cb6464cb9844
-
SHA1
784ff5f4e07973e152b1cca6290b6ade56328724
-
SHA256
936bc3b7d1f7581d64e1335b7b169dc2758f3af6dbe6a392c998a74ef3b4e29f
-
SHA512
4d7241194a34acf5d3fa081e4c08ef9dd5c9c7c28f1ae78ed92b25100a0fa3a427c7a8957f2516608db7a20fca61283c82cee107bbc70d548bb27f242fc303ac
-
SSDEEP
768:wqcOnIf4T+epD9KSxrMJkwhx8yUTzQKEZBLXSJTXx:bpg4TEMqkwohzFEZBaX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df4ba9ffa91b755adf67cb6464cb9844_JaffaCakes118
Files
-
df4ba9ffa91b755adf67cb6464cb9844_JaffaCakes118.sys windows:5 windows x86 arch:x86
e0386c45b1b80240d2260eeb5786f01c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ZwQueryValueKey
ZwOpenKey
RtlInitUnicodeString
_except_handler3
IofCompleteRequest
IoGetCurrentProcess
ZwDeleteValueKey
KeDelayExecutionThread
PsCreateSystemThread
wcsstr
_strnicmp
wcsncmp
wcslen
towlower
ExFreePool
wcscpy
ZwEnumerateKey
wcscat
ExAllocatePoolWithTag
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_wcsnicmp
RtlTimeToTimeFields
ExSystemTimeToLocalTime
KeQuerySystemTime
strncmp
PsGetVersion
strncpy
ObfDereferenceObject
ObQueryNameString
ObReferenceObjectByHandle
RtlCompareUnicodeString
ExGetPreviousMode
KeServiceDescriptorTable
ZwSetValueKey
ZwWriteFile
ZwSetInformationFile
ZwReadFile
ZwQueryInformationFile
ZwCreateFile
IoRegisterDriverReinitialization
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 800B - Virtual size: 782B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ