Static task
static1
General
-
Target
2f1749928afdf174ea8e1041c38a4366_JaffaCakes118
-
Size
40KB
-
MD5
2f1749928afdf174ea8e1041c38a4366
-
SHA1
d2a8837f0d27922f08f58129056fa0782f8c20fb
-
SHA256
7129a84d13b25cd8e3e6b9d02ee85d59f2ea78d543ce3bbcc269f8ffc58270d4
-
SHA512
747235b2786b9aff66350d76f0ebb20bd06393184d2fa778b57f9fa8a22e2acccc60121cce7465e7dc1ac7a6c96d3b96b5166b364feb17d2056c19c41b67e01a
-
SSDEEP
768:0O+Bn155xunKdGwH8pG7QweudRUDrwokYNX8Ib8Hn0YoS4otmcNVAlBJtoJjiosR:Yh1eKdtCyQPudWQokYNMIb8H0YiotmYP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f1749928afdf174ea8e1041c38a4366_JaffaCakes118
Files
-
2f1749928afdf174ea8e1041c38a4366_JaffaCakes118.sys windows:4 windows x86 arch:x86
8a0b19b29318b43e0cd6e01ac89ee7f9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
swprintf
_snwprintf
wcsncpy
wcslen
wcschr
strncpy
PsLookupProcessByProcessId
_stricmp
PsSetCreateProcessNotifyRoutine
IoGetCurrentProcess
ZwSetValueKey
IoRegisterDriverReinitialization
RtlCompareUnicodeString
RtlInitUnicodeString
ZwClose
ZwQueryValueKey
ZwOpenKey
ZwCreateFile
ObfDereferenceObject
MmIsAddressValid
PsGetVersion
strncmp
ExFreePool
_snprintf
ExAllocatePoolWithTag
KeDelayExecutionThread
KeQuerySystemTime
MmGetSystemRoutineAddress
PsCreateSystemThread
RtlAnsiStringToUnicodeString
_except_handler3
ZwSetInformationFile
wcscpy
ObReferenceObjectByHandle
wcsrchr
KeTickCount
KeQueryTimeIncrement
ZwDeleteKey
_wcsicmp
ZwCreateKey
wcscat
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
_wcsnicmp
IoDeviceObjectType
IofCompleteRequest
wcsstr
_wcslwr
RtlCopyUnicodeString
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 96B - Virtual size: 72B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEWMI Size: 32B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDRV Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGESYS Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEALL Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGEDATA Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGECODE Size: 32B - Virtual size: 8B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
PAGERES Size: 32B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ