Static task
static1
General
-
Target
ef0716a08ec2faf5670674dbe73e30fd_JaffaCakes118
-
Size
25KB
-
MD5
ef0716a08ec2faf5670674dbe73e30fd
-
SHA1
fad4f56ae9990489bd8396962661975096b19371
-
SHA256
e8398dd685ccab4281c5309f76dc3f4daaf4aa206052c1ed003be4535003045d
-
SHA512
506dbdde6bbe63e4d1d0e8256fad5acd8f2b836eb64ba16fb7f1394f740c8f4503c4cd13b72c62b6373ef4b83bd0b7085e0b4e36739c2b9d1f31af69a123853a
-
SSDEEP
768:ghuCShMmIxcFAa2NaEvTdb6BSEh4FxM0:Iu97ac+hNBvTp6Bh4F6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef0716a08ec2faf5670674dbe73e30fd_JaffaCakes118
Files
-
ef0716a08ec2faf5670674dbe73e30fd_JaffaCakes118.sys windows:4 windows x86 arch:x86
ad0b41746bea121c9f8faa779907e031
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcslen
memcpy
RtlUnicodeStringToAnsiString
KeSetKernelStackSwapEnable
memset
RtlUpperChar
IoSetDeviceToVerify
ExFreePool
RtlGetFirstRange
RtlCompareUnicodeString
KeInsertQueueDpc
NlsLeadByteInfo
ExAllocatePool
ObfReferenceObject
strcpy
KdDebuggerEnabled
_except_handler2
KeQuerySystemTime
PsSetLoadImageNotifyRoutine
RtlFreeUnicodeString
RtlInitString
ZwQueryInformationProcess
RtlImageNtHeader
RtlAnsiStringToUnicodeString
ExAcquireFastMutexUnsafe
CcFastMdlReadWait
ZwQueryDirectoryObject
MmFreeNonCachedMemory
ZwCreateSymbolicLinkObject
FsRtlGetNextFileLock
ZwDisplayString
MmUnmapVideoDisplay
RtlRealPredecessor
NtCreateSection
strcmp
FsRtlUninitializeFileLock
IoUnregisterShutdownNotification
ZwLoadKey
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 590B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
.mdata Size: 1024B - Virtual size: 772B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 42B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ