XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Static task
static1
General
-
Target
2c90b028a06bd66ce0d36596f043f45e_JaffaCakes118
-
Size
6KB
-
MD5
2c90b028a06bd66ce0d36596f043f45e
-
SHA1
560419fe3627cb1a65ff8d3900d19de96a92c4be
-
SHA256
c6f4e093af313a97b723332c1d7b4bf633e174702619438fa86e7009bad90a8b
-
SHA512
a467d8dc5a8679ede94939400a616df5e6a0bf05b7a1cee3450080c118e8de54c5da3124c9b8c1070ae8ab31bb59c6eaa49824fd48eb4447363a0564c81f277d
-
SSDEEP
96:n2ni7MwvFAv6FzwS4X6P1If9nnOFF8JgXh+SMCT+l3SBpAKtMz5m:saMF6F8bf9nuikhdiZKKm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2c90b028a06bd66ce0d36596f043f45e_JaffaCakes118
Files
-
2c90b028a06bd66ce0d36596f043f45e_JaffaCakes118.sys windows:5 windows x86 arch:x86
bb987107c12db4043bce620809ac5191
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwCreateJobObject
ObOpenObjectByPointer
_except_handler3
IoCreateFile
RtlInitUnicodeString
IoFreeIrp
KeSetEvent
KeWaitForSingleObject
IofCallDriver
RtlAssert
KeGetCurrentThread
KeInitializeEvent
ObfDereferenceObject
IoAllocateIrp
IoGetRelatedDeviceObject
ObReferenceObjectByHandle
IoFileObjectType
MmUnmapViewOfSection
ZwClose
ZwSetValueKey
wcslen
ZwOpenKey
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
ZwCreateKey
RtlInitAnsiString
IoCreateSymbolicLink
DbgPrint
IoCreateDevice
KeDetachProcess
ZwTerminateProcess
KeAttachProcess
IofCompleteRequest
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
IoDeleteDevice
IoDeleteSymbolicLink
PsLookupProcessByProcessId
hal
KeGetCurrentIrql
Sections
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 360B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ