Static task
static1
General
-
Target
0f6959dea6bc85c561fd3fb98eb671fc_JaffaCakes118
-
Size
33KB
-
MD5
0f6959dea6bc85c561fd3fb98eb671fc
-
SHA1
4998d5eb55190a8891d9c1f3318e240ffbfd8e15
-
SHA256
a776dec4280c0c3631bc40fbef5fc0fa152e01647ae89809709b01b83e7cbad8
-
SHA512
e4cf89d3581515e4b5f99a4388ca025e4f168a8c7c85643b2ea263dd9881b19ddf5a3022d6f6cade44063bbb7bc5140223e33cd85a677c1fcce3be7d028ea1a3
-
SSDEEP
768:a+LLhKJCvsrrSXIGjZ6kdmWoYrRE225fGoz:DLLhKJ33ApdNprRE225R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f6959dea6bc85c561fd3fb98eb671fc_JaffaCakes118
Files
-
0f6959dea6bc85c561fd3fb98eb671fc_JaffaCakes118.sys windows:5 windows x86 arch:x86
3e0faf5710a87da738768e10cb5a9fb1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
KeReleaseMutex
KeWaitForSingleObject
RtlInitUnicodeString
wcscpy
memset
IofCompleteRequest
_except_handler3
_local_unwind2
KeDelayExecutionThread
PsCreateSystemThread
ExFreePoolWithTag
memcpy
PsGetProcessId
ZwQuerySystemInformation
wcscmp
ExAllocatePool
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 640B - Virtual size: 596B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 896B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 896B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.bdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE