J:\koKPykT\ihqbsrAaZPohr\DhJzpwkeIUqTe\jdBgatneKavEgZ\BxeBuiObEjt.pdb
Static task
static1
Behavioral task
behavioral1
Sample
17bb8bf918986e8a3cae2e9d2b82d66d_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
17bb8bf918986e8a3cae2e9d2b82d66d_JaffaCakes118.dll
Resource
win10v2004-20240611-en
General
-
Target
17bb8bf918986e8a3cae2e9d2b82d66d_JaffaCakes118
-
Size
135KB
-
MD5
17bb8bf918986e8a3cae2e9d2b82d66d
-
SHA1
2dcd925361c8e25fb02fb303acb725eee4aea60a
-
SHA256
1e4a52891668a7999cb228a03c98de608fe39ca0fdd542f59e6001c3b0b1c85e
-
SHA512
b65306e7f32978444a0e4a33502690238028b5236b81766f7705716b92e56c7de69c8f977640a70bdc188b7846f5914ab932917faf66aaec0602445255705cdb
-
SSDEEP
3072:q0EsuqTAH/upQRWU7ZEAi0Gv7YHZE76VuLFUSfSEp:qHsuqkfuyWU7Zpi5YHaVLa7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17bb8bf918986e8a3cae2e9d2b82d66d_JaffaCakes118
Files
-
17bb8bf918986e8a3cae2e9d2b82d66d_JaffaCakes118.dll windows:5 windows x86 arch:x86
481ffb1f4aabdcb920afd0797b455cd3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
IoAllocateWorkItem
CcMdlWriteAbort
ExGetExclusiveWaiterCount
VerSetConditionMask
ZwOpenSection
RtlInitString
IoSetPartitionInformationEx
IoDeviceObjectType
FsRtlLookupLastLargeMcbEntry
RtlxOemStringToUnicodeSize
MmFreeMappingAddress
CcFastMdlReadWait
ExRaiseDatatypeMisalignment
IoGetLowerDeviceObject
RtlVerifyVersionInfo
KeReadStateTimer
ExReinitializeResourceLite
PsGetProcessExitTime
FsRtlNotifyUninitializeSync
MmAddVerifierThunks
IoRegisterDeviceInterface
ZwCreateKey
IoCreateStreamFileObjectLite
ExDeleteNPagedLookasideList
CcMdlReadComplete
CcCopyWrite
RtlSplay
IoGetRequestorProcessId
ObQueryNameString
KeReleaseSemaphore
MmProbeAndLockPages
SeTokenIsAdmin
KeWaitForSingleObject
RtlUnicodeToMultiByteN
KeSetEvent
CcPurgeCacheSection
MmCanFileBeTruncated
IoVolumeDeviceToDosName
RtlUnicodeStringToAnsiString
ExAcquireFastMutexUnsafe
IoDeleteSymbolicLink
RtlFreeUnicodeString
PoSetSystemState
RtlFindSetBits
KeFlushQueuedDpcs
ZwOpenProcess
ZwQueryValueKey
IoAllocateAdapterChannel
SeTokenIsRestricted
ZwFreeVirtualMemory
KefAcquireSpinLockAtDpcLevel
IoInitializeIrp
RtlFreeAnsiString
MmQuerySystemSize
FsRtlDeregisterUncProvider
IoGetCurrentProcess
IoCheckShareAccess
ZwClose
ProbeForRead
KeInitializeSpinLock
IoGetDeviceProperty
RtlCreateSecurityDescriptor
KeDetachProcess
RtlFreeOemString
CcSetReadAheadGranularity
RtlTimeToTimeFields
RtlInitAnsiString
KeGetCurrentThread
ZwUnloadDriver
KeUnstackDetachProcess
MmMapUserAddressesToPage
MmAllocatePagesForMdl
ExVerifySuite
MmAllocateMappingAddress
RtlIntegerToUnicodeString
RtlUnicodeStringToOemString
RtlAddAccessAllowedAce
IoRequestDeviceEject
IoRegisterFileSystem
FsRtlFastCheckLockForRead
RtlxUnicodeStringToAnsiSize
FsRtlMdlWriteCompleteDev
Exports
Exports
?CancelListItemOld@@YGPAXHHG<V
?DeleteCommandLineExA@@YGPAMPAG<V
?InvalidateWindowInfoExW@@YG_NJF<V
?CloseObjectExA@@YGPAXPADPAIGM<V
?InstallFunctionExA@@YGPAFNE<V
?InstallEventNew@@YGHHM<V
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ