P:\qdhrgmtHA\LaHzjjgv\vvxufmnPhcpp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0f8bdf7a49bbde1132775227b6a6c7e2_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0f8bdf7a49bbde1132775227b6a6c7e2_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
0f8bdf7a49bbde1132775227b6a6c7e2_JaffaCakes118
-
Size
37KB
-
MD5
0f8bdf7a49bbde1132775227b6a6c7e2
-
SHA1
ebe55c9de00ed0544dd0bbadd936d0732dacade9
-
SHA256
b6855034f354ff4a691da85c9911c93d27e581d0bdd28f09c8661449e3485a6b
-
SHA512
47fc89bd9ad09a9d84085c613e4a4e729097c864eac1f194c2a0be45fe6a6aea719ea99684147970ed56a763017837c6debcdc47e6df594eaf5b2390f0922d40
-
SSDEEP
768:UHi0LGlwfjLeMyiZaBUFkf7xSMRo8QoVZ8LQwn4T4Ag:UHi0LhfjLeMyi86ISMRzQor8l4T4Ag
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f8bdf7a49bbde1132775227b6a6c7e2_JaffaCakes118
Files
-
0f8bdf7a49bbde1132775227b6a6c7e2_JaffaCakes118.dll windows:5 windows x86 arch:x86
ba97fc6f873d6dbdb74a1886c7648be4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
IoGetTopLevelIrp
PsChargeProcessPoolQuota
KeRemoveEntryDeviceQueue
ZwSetVolumeInformationFile
SeCreateClientSecurity
IoAcquireCancelSpinLock
MmIsVerifierEnabled
IoCreateDisk
KeInsertQueueDpc
RtlLengthSid
RtlInitializeGenericTable
IoReleaseRemoveLockEx
CcPreparePinWrite
KeSaveFloatingPointState
RtlUnicodeStringToOemString
SePrivilegeCheck
CcMapData
FsRtlIsHpfsDbcsLegal
KeSetPriorityThread
PoCallDriver
RtlSecondsSince1970ToTime
RtlVolumeDeviceToDosName
FsRtlIsDbcsInExpression
IoFreeController
RtlSetBits
RtlxOemStringToUnicodeSize
RtlFindClearRuns
IoCreateSynchronizationEvent
IoFreeMdl
RtlFindClearBitsAndSet
ExReleaseResourceLite
RtlCreateSecurityDescriptor
KeInitializeDpc
KeSetSystemAffinityThread
RtlInitializeBitMap
SeSetSecurityDescriptorInfo
KeInsertHeadQueue
KeCancelTimer
RtlLengthSecurityDescriptor
IoGetRelatedDeviceObject
FsRtlDeregisterUncProvider
MmSizeOfMdl
MmMapLockedPagesSpecifyCache
IoDeleteDevice
IoAllocateErrorLogEntry
KeDeregisterBugCheckCallback
ObReferenceObjectByPointer
KeReleaseMutex
KeReadStateMutex
RtlUpcaseUnicodeToOemN
RtlDeleteElementGenericTable
RtlOemStringToUnicodeString
IoRequestDeviceEject
IoWritePartitionTableEx
RtlDeleteRegistryValue
SeLockSubjectContext
MmCanFileBeTruncated
IoCreateFile
PsLookupProcessByProcessId
FsRtlNotifyUninitializeSync
RtlCopyLuid
RtlCreateRegistryKey
KeBugCheck
PoStartNextPowerIrp
IoVerifyVolume
CcSetFileSizes
IoFreeWorkItem
ZwDeviceIoControlFile
RtlDeleteNoSplay
IoIsOperationSynchronous
ExRaiseDatatypeMisalignment
KeInitializeMutex
RtlFindClearBits
IoStopTimer
MmFreeMappingAddress
IoRaiseHardError
ZwCreateDirectoryObject
ZwCreateKey
IoCheckShareAccess
ExSystemTimeToLocalTime
KeQueryTimeIncrement
PsReferencePrimaryToken
ExSetTimerResolution
ZwQueryInformationFile
RtlCopyUnicodeString
ExGetSharedWaiterCount
ExLocalTimeToSystemTime
ZwMapViewOfSection
MmResetDriverPaging
RtlFindSetBits
RtlSecondsSince1980ToTime
ExIsProcessorFeaturePresent
ExGetExclusiveWaiterCount
PsIsThreadTerminating
KeRemoveQueue
ExAllocatePoolWithQuota
RtlInitAnsiString
RtlUpcaseUnicodeString
KeInitializeTimer
IoCreateNotificationEvent
ExAllocatePoolWithTag
CcPinMappedData
KeRemoveDeviceQueue
MmFreePagesFromMdl
MmSecureVirtualMemory
MmFreeNonCachedMemory
ExFreePool
PsGetVersion
IoReportResourceForDetection
MmIsAddressValid
ZwOpenSymbolicLinkObject
IoDeviceObjectType
SeAssignSecurity
ExAllocatePool
IoQueryFileInformation
ExRaiseStatus
KdDisableDebugger
RtlGetCallersAddress
ExDeletePagedLookasideList
IoDeleteController
KeInitializeDeviceQueue
IoWMIRegistrationControl
KeInitializeEvent
ExSetResourceOwnerPointer
PsGetProcessExitTime
IoStartNextPacket
PsTerminateSystemThread
IoCreateDevice
MmHighestUserAddress
CcRepinBcb
IoAllocateMdl
IoSetPartitionInformationEx
FsRtlNotifyInitializeSync
IoAcquireVpbSpinLock
CcMdlRead
SeSinglePrivilegeCheck
IoAllocateWorkItem
FsRtlIsTotalDeviceFailure
ObOpenObjectByPointer
IoIsWdmVersionAvailable
ZwEnumerateValueKey
SeQueryInformationToken
ZwCreateEvent
ExCreateCallback
SeDeassignSecurity
RtlSplay
RtlAddAccessAllowedAce
RtlTimeFieldsToTime
PsRevertToSelf
MmAllocateMappingAddress
KeInsertQueue
RtlUnicodeStringToInteger
IoReadPartitionTable
IoAllocateIrp
IoInvalidateDeviceState
IoThreadToProcess
WmiQueryTraceInformation
PsImpersonateClient
CcFastMdlReadWait
KeInitializeSpinLock
IoSetTopLevelIrp
RtlAnsiCharToUnicodeChar
PsSetLoadImageNotifyRoutine
RtlxAnsiStringToUnicodeSize
SeTokenIsAdmin
ObMakeTemporaryObject
MmUnlockPagableImageSection
ExDeleteNPagedLookasideList
KeAttachProcess
FsRtlGetNextFileLock
IoCreateSymbolicLink
MmPageEntireDriver
RtlCheckRegistryKey
HalExamineMBR
CcUnpinDataForThread
IoCheckEaBufferValidity
CcZeroData
IoGetDeviceObjectPointer
RtlTimeToSecondsSince1970
CcMdlWriteComplete
ZwLoadDriver
RtlInitUnicodeString
RtlUpperString
CcPurgeCacheSection
IoDetachDevice
SeOpenObjectAuditAlarm
SeAccessCheck
KeQueryInterruptTime
IoDeleteSymbolicLink
ZwOpenProcess
CcFastCopyWrite
IoGetStackLimits
IoGetCurrentProcess
RtlValidSecurityDescriptor
MmIsDriverVerifying
MmMapIoSpace
PsGetThreadProcessId
MmAllocateNonCachedMemory
SeValidSecurityDescriptor
IoReleaseCancelSpinLock
RtlIsNameLegalDOS8Dot3
RtlUnicodeToMultiByteN
ExGetPreviousMode
ZwCreateFile
FsRtlCheckOplock
IoStartTimer
MmIsThisAnNtAsSystem
ZwSetSecurityObject
IoFreeIrp
CcFastCopyRead
IoInitializeIrp
ZwQueryObject
RtlTimeToTimeFields
ZwFlushKey
IoStartPacket
CcSetBcbOwnerPointer
RtlOemToUnicodeN
CcFlushCache
FsRtlLookupLastLargeMcbEntry
IoQueueWorkItem
MmAddVerifierThunks
ZwFreeVirtualMemory
ExFreePoolWithTag
IoSetShareAccess
KeInitializeSemaphore
IoReleaseRemoveLockAndWaitEx
CcUninitializeCacheMap
RtlUpperChar
ExAcquireResourceSharedLite
IoQueryFileDosDeviceName
KeGetCurrentThread
RtlAnsiStringToUnicodeString
KeSynchronizeExecution
SeQueryAuthenticationIdToken
RtlWriteRegistryValue
KeInitializeApc
FsRtlAllocateFileLock
PoSetPowerState
KeSetKernelStackSwapEnable
IoGetAttachedDeviceReference
IoOpenDeviceRegistryKey
KeRegisterBugCheckCallback
RtlFindLongestRunClear
FsRtlIsFatDbcsLegal
CcUnpinRepinnedBcb
DbgBreakPoint
ObCreateObject
RtlMapGenericMask
RtlHashUnicodeString
IoReadPartitionTableEx
ZwPowerInformation
RtlGetVersion
MmMapUserAddressesToPage
ExQueueWorkItem
RtlAppendStringToString
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.t_i Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.t_e Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.t_p Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 568B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ