Static task
static1
General
-
Target
0cd38e467f910a582be15fbfff19cbb2_JaffaCakes118
-
Size
29KB
-
MD5
0cd38e467f910a582be15fbfff19cbb2
-
SHA1
5d5a847a645319c4d068927a17553f0a55de0c7b
-
SHA256
02cd8ad9df8ac6d5040cf1118b9da79155e9dddef29ba56edcc8835e8901f760
-
SHA512
e4e548e3e6514d1c86a200799ab57011490888c9f801b88bbafff868cf64f9a006695ffc6cf53db8a63f738820a2d7c3e4325fb37799ceec4786cb5f4077149c
-
SSDEEP
768:ew82fj4b2T7dTratrwb8w/CMBzrqh9emb:ep2fj62HxWt6t36emb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cd38e467f910a582be15fbfff19cbb2_JaffaCakes118
Files
-
0cd38e467f910a582be15fbfff19cbb2_JaffaCakes118.sys windows:4 windows x86 arch:x86
84ff67f9bcefed8133541f6e5f15b293
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
DbgBreakPoint
KeQuerySystemTime
ZwLoadKey
strcpy
KeI386GetLid
ZwQueryInformationProcess
RtlMapGenericMask
IoCreateDriver
ExAcquireFastMutexUnsafe
DbgBreakPointWithStatus
ZwDeviceIoControlFile
RtlImageNtHeader
IoUpdateShareAccess
ExFreePool
RtlEmptyAtomTable
ExAllocatePool
DbgPrint
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 1024B - Virtual size: 663B
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ