Static task
static1
General
-
Target
f046bcd3ce24ad3b24175a46dd8596c1_JaffaCakes118
-
Size
749KB
-
MD5
f046bcd3ce24ad3b24175a46dd8596c1
-
SHA1
36e31ccc9234ddaeac918199ff17bf224903c5a1
-
SHA256
9b30d2b1bd39c5f45a79ae4950279d6a0ffb7c585f62663c7fc3562cafff76e8
-
SHA512
fe6dfaba3e5032aa8401c47509e03168e8ea178cb0e2696991edb894e8eeb6067011130acc2d46824aa19945f082b305b7d66000f3a5c42e3beea0e7d4abd3b8
-
SSDEEP
12288:3JK7iOlCCKN/IK67dP2WTOv84xQLE6V3L8pr4jdYtpvea988spEDdJKKuAu20lSE:3Gi+c16BPlW8y6q0jdCx99spEpurP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f046bcd3ce24ad3b24175a46dd8596c1_JaffaCakes118
Files
-
f046bcd3ce24ad3b24175a46dd8596c1_JaffaCakes118.sys windows:4 windows x86 arch:x86
ad83788d10669d0d0c0a38f29227dd82
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwQuerySystemInformation
ExAllocatePoolWithTag
ExFreePoolWithTag
RtlAppendAsciizToString
KeCancelTimer
RtlDecompressBuffer
ZwSetEaFile
ZwAllocateVirtualMemory
ExFreePool
RtlGetElementGenericTable
ExAcquireSharedWaitForExclusive
FsRtlAllocatePoolWithTag
SeTokenIsRestricted
ZwMakeTemporaryObject
RtlGetNtGlobalFlags
ZwQueryDirectoryObject
PsRevertToSelf
MmTrimAllSystemPagableMemory
ObOpenObjectByPointer
LpcRequestPort
MmMapVideoDisplay
Exfi386InterlockedIncrementLong
RtlTraceDatabaseEnumerate
KeReleaseMutex
_global_unwind2
IoAllocateErrorLogEntry
RtlLookupElementGenericTable
MmIsRecursiveIoFault
atol
ObQueryObjectAuditingByHandle
SePrivilegeCheck
ExInitializeZone
PsLookupThreadByThreadId
KeInsertDeviceQueue
KeGetPreviousMode
SeSetAccessStateGenericMapping
RtlCopyString
MmSetAddressRangeModified
KeInitializeQueue
InbvSetScrollRegion
SeMarkLogonSessionForTerminationNotification
FsRtlCopyRead
SeCloseObjectAuditAlarm
RtlFreeAnsiString
IoIsOperationSynchronous
NlsOemLeadByteInfo
RtlSetSaclSecurityDescriptor
KeReadStateSemaphore
RtlFreeRangeList
IoFreeWorkItem
FsRtlGetNextMcbEntry
IoAcquireCancelSpinLock
ExRaiseAccessViolation
FsRtlProcessFileLock
NtQueryEaFile
ZwQueryDefaultLocale
InterlockedExchange
CcMapData
FsRtlRemoveMcbEntry
IoCreateDevice
RtlZeroHeap
MmFreePagesFromMdl
RtlGUIDFromString
_itoa
ZwReadFile
RtlSetDaclSecurityDescriptor
KeQueryPriorityThread
MmLockPagableSectionByHandle
ZwEnumerateKey
PsImpersonateClient
RtlRaiseException
Sections
.text Size: 342KB - Virtual size: 342KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 393KB - Virtual size: 393KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ