Static task
static1
General
-
Target
eb85d2b9978c64eb4a3b55b4176af607_JaffaCakes118
-
Size
4KB
-
MD5
eb85d2b9978c64eb4a3b55b4176af607
-
SHA1
e26691289b9cd73e82c48a3e50832890569f2106
-
SHA256
ab02551557319f2d3b4138b7a5533039d1e8768a58e2a869729598e622c50667
-
SHA512
582d036c28bc17656859acde50b65abceb15295d2d1b0492ba28dc04b7e62447f91f6f9cf60be1219e2ca3c413e30f62b37d94e425bdc81126833c762a642a9d
-
SSDEEP
96:ikI7DJ7s7h7e4vTuhJRDzw6ISKpHVLFh86zRfn/eUu:ikAE7XvT0R46IBpK6zRna
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb85d2b9978c64eb4a3b55b4176af607_JaffaCakes118
Files
-
eb85d2b9978c64eb4a3b55b4176af607_JaffaCakes118.sys windows:5 windows x86 arch:x86
38974e8a653c0d775d0fc1a256e6689f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ObfDereferenceObject
ObOpenObjectByPointer
PsLookupProcessByProcessId
PsTerminateSystemThread
ZwClose
NtBuildNumber
KeClearEvent
KeWaitForSingleObject
KeCancelTimer
KeSetTimer
KeInitializeTimer
IofCompleteRequest
KeSetEvent
memcpy
ExAllocatePoolWithTag
ObReferenceObjectByHandle
PsCreateSystemThread
KeInitializeEvent
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
DbgPrint
strlen
IofCallDriver
IoBuildDeviceIoControlRequest
IoGetDeviceObjectPointer
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 482B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 320B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 704B - Virtual size: 688B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 320B - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ