Static task
static1
General
-
Target
14479c5b0aad3a4b6083568a73bc9263_JaffaCakes118
-
Size
40KB
-
MD5
14479c5b0aad3a4b6083568a73bc9263
-
SHA1
8787fcb270dfe04caaffbac348e37e06ac877c18
-
SHA256
77365b8cd5c662aa146c5c35ac29f61cd57bf03c8b099e0b2730b5391db9aefc
-
SHA512
c48d95ea988f78dcc2c780a18d1a956efd9f0886a496828ac1972e57ef67f5295136cbac3b8e03adfe374937e307b63c8c51b90ea518eb48240c1429edf97bfb
-
SSDEEP
768:1SgpxVRjbX3RTV4NS+DyhftqY8e5LNFJVn7LRhBmL6K2i9eoj/yeclA7hLC:17pBjT5eehftLLNtN+L6K2Fojslkh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 14479c5b0aad3a4b6083568a73bc9263_JaffaCakes118
Files
-
14479c5b0aad3a4b6083568a73bc9263_JaffaCakes118.sys windows:4 windows x86 arch:x86
67bce33a1af12e7d109be857150dca41
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ObReferenceObjectByHandle
swprintf
MmIsAddressValid
IoDeviceObjectType
RtlInitUnicodeString
IofCompleteRequest
ZwClose
PsCreateSystemThread
strncmp
PsSetCreateProcessNotifyRoutine
ZwSetInformationFile
ZwCreateFile
wcslen
wcscpy
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
IoGetCurrentProcess
RtlCompareUnicodeString
KeTickCount
KeQueryTimeIncrement
_stricmp
ObfDereferenceObject
ZwOpenKey
wcsncpy
wcsrchr
PsGetVersion
ZwSetValueKey
_wcsnicmp
_snwprintf
wcschr
RtlAnsiStringToUnicodeString
_wcsicmp
strncpy
KeDelayExecutionThread
KeQuerySystemTime
ZwQueryValueKey
ExFreePool
_snprintf
ExAllocatePoolWithTag
ZwCreateKey
ZwDeleteKey
wcscat
wcsstr
_wcslwr
_except_handler3
PsLookupProcessByProcessId
MmGetSystemRoutineAddress
IoRegisterDriverReinitialization
RtlCopyUnicodeString
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGE Size: 64B - Virtual size: 63B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ