Static task
static1
General
-
Target
ff9ff4b8b7f1684fc4032c3643ca138c_JaffaCakes118
-
Size
40KB
-
MD5
ff9ff4b8b7f1684fc4032c3643ca138c
-
SHA1
f59a5f6a546c0201b88f4268a2e14891d81e6c79
-
SHA256
5afc81535974ee4ceeec36093aa47124e9e1ffee30ab0e9219293619cc5086eb
-
SHA512
cd9348146a2b2d7bb973f9e235a68cbe922d1e8fcdfabef8eb6ddc81466474ffa34f4dba704add3b390732182c3f96c732c1c7c85704048868d8a892bb0128d0
-
SSDEEP
768:iKcSUxs/sl4uWRfsYzJawLdNp1IToAcJqIcqDvPLHr:2SMVlzSsYzNpeUdZvPLH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff9ff4b8b7f1684fc4032c3643ca138c_JaffaCakes118
Files
-
ff9ff4b8b7f1684fc4032c3643ca138c_JaffaCakes118.sys windows:4 windows x86 arch:x86
f2659a0233880d6eaada5d2ac71dff62
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
MmIsAddressValid
strncpy
IoGetCurrentProcess
ZwClose
swprintf
ZwOpenKey
ObReferenceObjectByHandle
_wcsnicmp
wcslen
ObfDereferenceObject
RtlInitUnicodeString
wcsncpy
wcsrchr
ZwDeleteKey
_snwprintf
wcschr
PsGetVersion
strncmp
ZwSetValueKey
ZwQueryValueKey
ZwSetInformationFile
ZwCreateFile
wcscpy
RtlCopyUnicodeString
IofCompleteRequest
IoDeviceObjectType
_wcsicmp
KeDelayExecutionThread
KeQuerySystemTime
PsSetCreateProcessNotifyRoutine
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
RtlCompareUnicodeString
ExFreePool
_snprintf
ExAllocatePoolWithTag
wcscat
IoRegisterDriverReinitialization
_except_handler3
PsLookupProcessByProcessId
_stricmp
RtlAnsiStringToUnicodeString
wcsstr
_wcslwr
ZwCreateKey
PsCreateSystemThread
MmGetSystemRoutineAddress
KeTickCount
KeQueryTimeIncrement
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 64B - Virtual size: 54B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ