Static task
static1
General
-
Target
00afbaee87e8a9cc83d110e20bba0a41_JaffaCakes118
-
Size
28KB
-
MD5
00afbaee87e8a9cc83d110e20bba0a41
-
SHA1
392467373e0c76ed829e21871435c384581c6ef3
-
SHA256
02ce269510564a26b320229b0bf7d1fc07d995e1d2675145348204d3ee3c2037
-
SHA512
94d818140670fbf05a3cdf0f72846762ec81652c2f886a173399bc14808eda5f84c53279efcab6d89db4bdb3a4d93d14e0f71c391003ff955d7401d043f5fa89
-
SSDEEP
768:zLoqxi9IJ5+vjSSOedTl5pAlzjq0Ucz/ISyzGwhle/ejHV9:Iqx2veSZJlXAFjq0zTISIGwTe/GHr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00afbaee87e8a9cc83d110e20bba0a41_JaffaCakes118
Files
-
00afbaee87e8a9cc83d110e20bba0a41_JaffaCakes118.sys windows:4 windows x86 arch:x86
3e9b3dbaa0088e38ad53c7d626fc3f91
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
wcscat
wcscpy
swprintf
RtlInitUnicodeString
wcslen
ExFreePool
_snprintf
ExAllocatePoolWithTag
MmGetSystemRoutineAddress
_strnicmp
strncpy
strncmp
_stricmp
RtlCopyUnicodeString
ObfDereferenceObject
_wcsnicmp
ZwClose
ZwOpenKey
RtlAnsiStringToUnicodeString
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 800B - Virtual size: 796B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ