J:\koKPykT\ihqbsrAaZPohr\DhJzpwkeIUqTe\jdBgatneKavEgZ\BxeBuiObEjt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0fd7d096dc09309f4461422c5422fc24_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0fd7d096dc09309f4461422c5422fc24_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
0fd7d096dc09309f4461422c5422fc24_JaffaCakes118
-
Size
63KB
-
MD5
0fd7d096dc09309f4461422c5422fc24
-
SHA1
bc097dcd900e157d9d0002825c466c81bd6379c0
-
SHA256
f1415592bd339d4fe184d448289b55dbe562d605ff3dd1498d782690f68687eb
-
SHA512
13cefb246afacc1234e189c40c29ca3195b0f8b88ffef0033f4b6dd5a8772dde4a8ff6b6f369b398e486020c0882532a2740394c8dd9d9388c543bbec5e7169a
-
SSDEEP
1536:WEHza9zU6APhYqryC+xgER/99jU2HCgW0yKVS7FjQtJsp/:W0EsuqTAH/upQ3s
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fd7d096dc09309f4461422c5422fc24_JaffaCakes118
Files
-
0fd7d096dc09309f4461422c5422fc24_JaffaCakes118.dll windows:5 windows x86 arch:x86
481ffb1f4aabdcb920afd0797b455cd3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
IoAllocateWorkItem
CcMdlWriteAbort
ExGetExclusiveWaiterCount
VerSetConditionMask
ZwOpenSection
RtlInitString
IoSetPartitionInformationEx
IoDeviceObjectType
FsRtlLookupLastLargeMcbEntry
RtlxOemStringToUnicodeSize
MmFreeMappingAddress
CcFastMdlReadWait
ExRaiseDatatypeMisalignment
IoGetLowerDeviceObject
RtlVerifyVersionInfo
KeReadStateTimer
ExReinitializeResourceLite
PsGetProcessExitTime
FsRtlNotifyUninitializeSync
MmAddVerifierThunks
IoRegisterDeviceInterface
ZwCreateKey
IoCreateStreamFileObjectLite
ExDeleteNPagedLookasideList
CcMdlReadComplete
CcCopyWrite
RtlSplay
IoGetRequestorProcessId
ObQueryNameString
KeReleaseSemaphore
MmProbeAndLockPages
SeTokenIsAdmin
KeWaitForSingleObject
RtlUnicodeToMultiByteN
KeSetEvent
CcPurgeCacheSection
MmCanFileBeTruncated
IoVolumeDeviceToDosName
RtlUnicodeStringToAnsiString
ExAcquireFastMutexUnsafe
IoDeleteSymbolicLink
RtlFreeUnicodeString
PoSetSystemState
RtlFindSetBits
KeFlushQueuedDpcs
ZwOpenProcess
ZwQueryValueKey
IoAllocateAdapterChannel
SeTokenIsRestricted
ZwFreeVirtualMemory
KefAcquireSpinLockAtDpcLevel
IoInitializeIrp
RtlFreeAnsiString
MmQuerySystemSize
FsRtlDeregisterUncProvider
IoGetCurrentProcess
IoCheckShareAccess
ZwClose
ProbeForRead
KeInitializeSpinLock
IoGetDeviceProperty
RtlCreateSecurityDescriptor
KeDetachProcess
RtlFreeOemString
CcSetReadAheadGranularity
RtlTimeToTimeFields
RtlInitAnsiString
KeGetCurrentThread
ZwUnloadDriver
KeUnstackDetachProcess
MmMapUserAddressesToPage
MmAllocatePagesForMdl
ExVerifySuite
MmAllocateMappingAddress
RtlIntegerToUnicodeString
RtlUnicodeStringToOemString
RtlAddAccessAllowedAce
IoRequestDeviceEject
IoRegisterFileSystem
FsRtlFastCheckLockForRead
RtlxUnicodeStringToAnsiSize
FsRtlMdlWriteCompleteDev
Exports
Exports
?CancelListItemOld@@YGPAXHHG<V
?DeleteCommandLineExA@@YGPAMPAG<V
?InvalidateWindowInfoExW@@YG_NJF<V
?CloseObjectExA@@YGPAXPADPAIGM<V
?InstallFunctionExA@@YGPAFNE<V
?InstallEventNew@@YGHHM<V
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ