Static task
static1
General
-
Target
ff5bcbc0a52fba3a6758bcecc8197414_JaffaCakes118
-
Size
8KB
-
MD5
ff5bcbc0a52fba3a6758bcecc8197414
-
SHA1
4da918952c202a06382e1abe4eccbf58ad359b3b
-
SHA256
2d467214d5fc5d0e993e994800699d15ed7eb970dbe4465e26bb5eeb04fb572f
-
SHA512
0f5678fe3ced16ce24cafcbc3d17b460d3b59bbd3f5fec026ff0dc0493683612ee4f328d2baefcf47e00e9b78eae703e692bac73b7ebcc5c689a9e162e3c3150
-
SSDEEP
192:VCyz+sU4UYmBTBZdLC6JRzGWPazqLP7o0+pE0CLsnYflVp:xcvd53dXofpFCLnVp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff5bcbc0a52fba3a6758bcecc8197414_JaffaCakes118
Files
-
ff5bcbc0a52fba3a6758bcecc8197414_JaffaCakes118.sys windows:5 windows x86 arch:x86
317bfefaef8b5b21c30dff8dfd221fbd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwDeleteValueKey
KeWaitForSingleObject
wcsstr
_wcsupr
strncpy
IoGetCurrentProcess
RtlMultiByteToUnicodeN
PsGetCurrentProcessId
_stricmp
_except_handler3
ObfDereferenceObject
ExFreePool
KeUnstackDetachProcess
KeStackAttachProcess
ExAllocatePoolWithTag
ObReferenceObjectByHandle
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
ZwOpenProcess
ZwSetValueKey
RtlInitUnicodeString
KeReleaseMutex
ZwDeleteKey
ZwQueryValueKey
ZwCreateKey
ZwOpenKey
IofCompleteRequest
MmMapLockedPages
IoDeleteDevice
IoDeleteSymbolicLink
ZwQuerySystemInformation
ZwEnumerateValueKey
ZwEnumerateKey
ZwOpenFile
ZwCreateFile
InterlockedExchange
KeServiceDescriptorTable
ZwQueryDirectoryFile
KeInitializeMutex
IoCreateSymbolicLink
IoCreateDevice
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 384B - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 484B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ