Static task
static1
Behavioral task
behavioral1
Sample
f4d08c6186a8d262d485520f06b3ec06_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4d08c6186a8d262d485520f06b3ec06_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f4d08c6186a8d262d485520f06b3ec06_JaffaCakes118
-
Size
81KB
-
MD5
f4d08c6186a8d262d485520f06b3ec06
-
SHA1
cff82bd9e4f5e3a603c8df9d61114cd99a3fcbc7
-
SHA256
3e592ba3f5d88ab1d4d5606f24688b124ae24ed4e7ee46ce4a30b718ec6fa141
-
SHA512
a65010e63de1f43d79080752c0b08f43786481970e97693e3b4b9480fcbcca920fa9bb9ce3dd45e2871e120e95402cd0aac3a6b57754dc891b30111aa7a91086
-
SSDEEP
768:fVqA09dOYqiNzkEXWh237CPDpVhtJK74OQ2JMACCu74V69woYuB45gwbD4f3hV6y:0Aa/Nt32rPTJSrQ6U0aB45gwbEREXjt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f4d08c6186a8d262d485520f06b3ec06_JaffaCakes118
Files
-
f4d08c6186a8d262d485520f06b3ec06_JaffaCakes118.dll windows:5 windows x86 arch:x86
320a658c1247854b74e2a612e4f815d5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntoskrnl.exe
ExDeleteResourceLite
KeInitializeEvent
KeEnterCriticalRegion
ExAcquireFastMutexUnsafe
ExReleaseFastMutexUnsafe
KeLeaveCriticalRegion
ExAllocatePool
ExFreePoolWithTag
RtlInsertElementGenericTableAvl
RtlDeleteElementGenericTableAvl
RtlInitializeGenericTableAvl
NtOpenFile
NtQueryVolumeInformationFile
NtClose
swprintf
RtlInitUnicodeString
ObReferenceObjectByHandle
IoGetRelatedDeviceObject
ExAcquireResourceExclusiveLite
ExReleaseResourceLite
ExAcquireResourceSharedLite
ZwCreateFile
IoGetStackLimits
MmFlushImageSection
CcInitializeCacheMap
CcPurgeCacheSection
CcSetFileSizes
ZwClose
MmMapLockedPagesSpecifyCache
CcFlushCache
CcUninitializeCacheMap
IofCallDriver
IofCompleteRequest
IoSetInformation
CcCopyWrite
FsRtlCopyRead
IoCreateDevice
ZwAllocateVirtualMemory
memcpy
ZwQuerySystemInformation
_stricmp
ZwOpenThread
ZwQueryInformationThread
RtlEqualUnicodeString
PsLookupProcessThreadByCid
KeInitializeApc
ExInitializeResourceLite
KeInsertQueueApc
KeDelayExecutionThread
PsCreateSystemThread
ZwOpenKey
ZwQueryValueKey
ZwSetValueKey
strcpy
ZwOpenFile
ZwQueryObject
ZwQueryInformationFile
ZwDeviceIoControlFile
wcslen
ZwCreateSymbolicLinkObject
ZwCreateDirectoryObject
ZwWriteFile
ZwCreateSection
IoGetCurrentProcess
PsLookupProcessByProcessId
ZwOpenSection
ZwMapViewOfSection
MmAllocatePagesForMdl
MmUnmapLockedPages
MmFreePagesFromMdl
ZwUnmapViewOfSection
RtlHashUnicodeString
ZwReadFile
IoFreeIrp
KeSetEvent
RtlPrefixUnicodeString
IoAllocateIrp
KeWaitForSingleObject
ExAllocatePoolWithTag
PoStartNextPowerIrp
PoCallDriver
ZwFlushVirtualMemory
ZwEnumerateKey
ZwDeleteKey
ZwQueryKey
ZwSetSystemInformation
IoCreateDriver
ObMakeTemporaryObject
ZwDeleteFile
ObReferenceObjectByName
IoDriverObjectType
IoEnumerateDeviceObjectList
wcsrchr
IoQueryFileInformation
memset
ObfReferenceObject
ObfDereferenceObject
hal
KfLowerIrql
KeGetCurrentIrql
KfRaiseIrql
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ