Static task
static1
General
-
Target
165d6cae599670a20b5aedb462c7107c_JaffaCakes118
-
Size
26KB
-
MD5
165d6cae599670a20b5aedb462c7107c
-
SHA1
824ca56bca3cb3cb4f6ab545ab84df3fd29747d0
-
SHA256
b7bd8ee1461f80fd7dce8425431a3755d26deaa3c8f99845db3d3667c61e6ad3
-
SHA512
c8f83985f61d27ad202d46b4bcbb2842dbd306427d69c670330e54d6404fa261ab6e2d338f59006a6b7f4c6422ee90ffb078591b0b798c5f564f70879f210ed8
-
SSDEEP
384:Z0VI2YqLfuRDmsiwS/oP+FBlDo+5aja/D2xds31v/3U9rt5B:Z0hY3SF99D2x+31v/UZt5B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 165d6cae599670a20b5aedb462c7107c_JaffaCakes118
Files
-
165d6cae599670a20b5aedb462c7107c_JaffaCakes118.sys windows:4 windows x86 arch:x86
2fc8bd0098d5eef6181f5b66dd6b4fbe
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ZwClose
ObReferenceObjectByHandle
PsCreateSystemThread
_except_handler3
ObfDereferenceObject
KeWaitForSingleObject
PsTerminateSystemThread
KeDelayExecutionThread
strcmp
IoGetCurrentProcess
ExFreePoolWithTag
KeInsertQueueApc
KeInitializeApc
ExAllocatePoolWithTag
ZwFreeVirtualMemory
ZwOpenProcess
PsGetProcessId
memcpy
KeUnstackDetachProcess
KeStackAttachProcess
ZwAllocateVirtualMemory
NtBuildNumber
ObReferenceObjectByPointer
PsProcessType
KeServiceDescriptorTable
PsGetCurrentProcessId
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1024B - Virtual size: 714B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 394B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ