Static task
static1
General
-
Target
fa726ae136b0b844357d0c13a5d531e2_JaffaCakes118
-
Size
2KB
-
MD5
fa726ae136b0b844357d0c13a5d531e2
-
SHA1
8f5bc9f1f6b095f12a6e680fc0eb97561b034795
-
SHA256
876beb998f151c5bc859a7e8a3647d4478fffcae63c427181bd6652d34a3f50d
-
SHA512
96aa4881e2ab3b8bf182de09428d55840e91ee99d3610c97ad2fb95c0c64b0d79b976bc5b2dabff25fd7e2361ab54c918874a3f875ae001915ba5a0d42b89ecf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa726ae136b0b844357d0c13a5d531e2_JaffaCakes118
Files
-
fa726ae136b0b844357d0c13a5d531e2_JaffaCakes118.sys windows:4 windows x86 arch:x86
180974f67b163680f202b87f3ae6d2a0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ExAllocatePool
_stricmp
RtlInitAnsiString
RtlAnsiStringToUnicodeString
ZwReadFile
ExAllocatePoolWithTag
ZwClose
ZwQueryInformationFile
ZwCreateFile
ExFreePool
ExFreePoolWithTag
memcpy
strcat
RtlFreeUnicodeString
ZwQuerySystemInformation
DbgPrint
KeServiceDescriptorTable
strcpy
InterlockedExchange
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 96B - Virtual size: 74B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ