Static task
static1
General
-
Target
0b0d412b08fe66e635eb631d0c9b0aa1_JaffaCakes118
-
Size
27KB
-
MD5
0b0d412b08fe66e635eb631d0c9b0aa1
-
SHA1
c1995cc5d56d6bc7d5162877ffdf2f73e2bae643
-
SHA256
0a3a4c98c9b7bd7ca223476e3ed779497e7b60df9f65ed6ffbc72dc2bbb37f6a
-
SHA512
62d1a1eb7ca707548c7d57c36ac05fa7da19eece0d0ecdc227989e5a6df4ac1b2e10d2c87f80fc8c8888477937312f68e5bf0d4f2f8c5fd76c8b16742da4b47d
-
SSDEEP
768:mUzbrFBzIi1FhBEKN0lP30ADs1mNJmH/9Aq0hl:3zbrb//hBErP3DscNQHVAqM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b0d412b08fe66e635eb631d0c9b0aa1_JaffaCakes118
Files
-
0b0d412b08fe66e635eb631d0c9b0aa1_JaffaCakes118.sys windows:4 windows x86 arch:x86
b0ee5d766d3a8cd55dac88af5c254e0e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
swprintf
RtlAnsiStringToUnicodeString
strncpy
_strnicmp
_wcsnicmp
wcslen
MmGetSystemRoutineAddress
ObfDereferenceObject
wcscat
wcscpy
_itow
_except_handler3
strncmp
IofCompleteRequest
_stricmp
ExFreePool
_snprintf
ExAllocatePoolWithTag
ZwClose
ZwOpenKey
RtlCopyUnicodeString
Sections
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 832B - Virtual size: 806B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ