XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Static task
static1
General
-
Target
104d940ad6362e924e13326482d279d8_JaffaCakes118
-
Size
6KB
-
MD5
104d940ad6362e924e13326482d279d8
-
SHA1
24f804ac2199a7e969c99017ddc2b514e3ec5aa8
-
SHA256
b21287cc5f04c096fae7ab9452e96f9f641c4a2842446982b453045ab53b6e0f
-
SHA512
a743c70baa20416a1cc2132cd1d98cff962d30f0cf2565210eded1f6329b67e924660dbaaad65f78cce60e3b2f0ce47bd1826dfebb9316439927b47a3b83f9d2
-
SSDEEP
96:jqoYMwvFAvKFzwS4XqP1If9nnOQlSNDxOScSj+l3SxpAKtMzkA:5YMFKF8Lf9nb41xty564
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 104d940ad6362e924e13326482d279d8_JaffaCakes118
Files
-
104d940ad6362e924e13326482d279d8_JaffaCakes118.sys windows:5 windows x86 arch:x86
bb987107c12db4043bce620809ac5191
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwCreateJobObject
ObOpenObjectByPointer
_except_handler3
IoCreateFile
RtlInitUnicodeString
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
IofCallDriver
RtlAssert
KeGetCurrentThread
KeInitializeEvent
ObfDereferenceObject
IoAllocateIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
MmUnmapViewOfSection
ZwClose
ZwSetValueKey
wcslen
ZwOpenKey
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
ZwCreateKey
RtlInitAnsiString
IoCreateSymbolicLink
DbgPrint
IoCreateDevice
KeDetachProcess
ZwTerminateProcess
KeAttachProcess
IofCompleteRequest
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
IoDeleteDevice
IoDeleteSymbolicLink
PsLookupProcessByProcessId
hal
KeGetCurrentIrql
Sections
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ