Z:\zwHMDlgCrYg\YyucdyNwriu\hawjupxMixxmy\utvtcJPoHm\ssbJrWaNvdiCP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2d5bcf2e248ddf6bb7e1f8f3b699aa04_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d5bcf2e248ddf6bb7e1f8f3b699aa04_JaffaCakes118.dll
Resource
win10v2004-20240708-en
General
-
Target
2d5bcf2e248ddf6bb7e1f8f3b699aa04_JaffaCakes118
-
Size
39KB
-
MD5
2d5bcf2e248ddf6bb7e1f8f3b699aa04
-
SHA1
97f32bea01128c3a57fef77e42da81520b553cc7
-
SHA256
2e34577e9e344c6c4ed0561c81c14631ce42783b3068bb08f40b370678d08093
-
SHA512
13241a0079094a22fdb86bdce8f927b79185791248eec2bdf57414d7a13a84798991c74470902bc8d34c2f4a588fefb9e11f3b8f6c7b0e750f3f00e895df4506
-
SSDEEP
768:rDJ9Pi6jF4yeO8topEbxtQxPyid6e4rw2JPBvFl9mgJ:XJg6jFeBWPfdMPJ93
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d5bcf2e248ddf6bb7e1f8f3b699aa04_JaffaCakes118
Files
-
2d5bcf2e248ddf6bb7e1f8f3b699aa04_JaffaCakes118.dll windows:5 windows x86 arch:x86
4276febc803024f1a146070b33a4a4a5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
KeSetEvent
FsRtlIsNameInExpression
RtlDeleteRegistryValue
KeEnterCriticalRegion
RtlFindUnicodePrefix
IoRegisterDeviceInterface
RtlUpcaseUnicodeToOemN
CcUnpinDataForThread
RtlRandom
CcZeroData
PoSetPowerState
KeQueryTimeIncrement
KeStackAttachProcess
SeDeleteObjectAuditAlarm
IoInvalidateDeviceState
MmBuildMdlForNonPagedPool
IoCheckShareAccess
KeRemoveByKeyDeviceQueue
KeSetTimer
ExGetSharedWaiterCount
KeSetPriorityThread
ZwQueryValueKey
RtlSetAllBits
RtlWriteRegistryValue
ExDeleteNPagedLookasideList
RtlHashUnicodeString
ZwOpenSymbolicLinkObject
ExIsProcessorFeaturePresent
RtlPrefixUnicodeString
MmPageEntireDriver
KeDelayExecutionThread
RtlTimeToTimeFields
ZwOpenProcess
IoDetachDevice
IoCreateDevice
PoRequestPowerIrp
RtlFillMemoryUlong
MmUnlockPagableImageSection
KeRemoveDeviceQueue
RtlInitAnsiString
KeSetTargetProcessorDpc
RtlEqualString
IoSetThreadHardErrorMode
KeInitializeSpinLock
ZwCreateDirectoryObject
PsIsThreadTerminating
KeRegisterBugCheckCallback
RtlFindClearBits
RtlFindLongestRunClear
MmLockPagableDataSection
SeCreateClientSecurity
IoInitializeIrp
KeInitializeTimerEx
IoGetStackLimits
RtlAppendStringToString
SeTokenIsRestricted
IoReportResourceForDetection
RtlMapGenericMask
RtlUpperChar
IoFreeController
ZwEnumerateKey
RtlGetNextRange
RtlEnumerateGenericTable
IoGetDeviceObjectPointer
MmQuerySystemSize
MmFreePagesFromMdl
FsRtlSplitLargeMcb
RtlEqualSid
IoSetSystemPartition
IoAllocateController
RtlUpperString
RtlCompareUnicodeString
RtlGetVersion
KeFlushQueuedDpcs
ExFreePoolWithTag
RtlAnsiCharToUnicodeChar
KeQueryActiveProcessors
PsDereferencePrimaryToken
KeInsertQueue
MmFreeContiguousMemory
RtlNtStatusToDosError
FsRtlIsDbcsInExpression
KeLeaveCriticalRegion
KeSaveFloatingPointState
ZwQueryVolumeInformationFile
RtlUpcaseUnicodeString
IoGetDeviceProperty
ExLocalTimeToSystemTime
IoStartPacket
RtlInitString
RtlInsertUnicodePrefix
MmSetAddressRangeModified
SeDeassignSecurity
RtlAppendUnicodeToString
RtlCheckRegistryKey
ExNotifyCallback
ZwDeviceIoControlFile
ZwOpenKey
ExGetExclusiveWaiterCount
IoGetRelatedDeviceObject
KeRemoveQueue
FsRtlAllocateFileLock
IoDeleteSymbolicLink
IoIsSystemThread
KeQueryInterruptTime
IoGetDeviceInterfaces
RtlCompareMemory
IoStartNextPacket
KeSetImportanceDpc
RtlInitializeBitMap
ZwFsControlFile
FsRtlIsHpfsDbcsLegal
KeWaitForMultipleObjects
KeWaitForSingleObject
IoUpdateShareAccess
MmUnsecureVirtualMemory
PsCreateSystemThread
RtlUpcaseUnicodeChar
ZwOpenFile
ExRaiseStatus
KeInitializeSemaphore
KeInitializeQueue
PoUnregisterSystemState
CcFastMdlReadWait
ZwReadFile
IoRaiseHardError
KeInsertDeviceQueue
RtlCompareString
CcPreparePinWrite
IoDeviceObjectType
MmResetDriverPaging
KeInsertQueueDpc
IoConnectInterrupt
KdDisableDebugger
KeReadStateEvent
RtlEqualUnicodeString
RtlCreateSecurityDescriptor
MmHighestUserAddress
RtlLengthRequiredSid
IoReportDetectedDevice
IoWMIRegistrationControl
ExDeleteResourceLite
RtlTimeToSecondsSince1980
KdEnableDebugger
RtlAreBitsClear
KeInitializeTimer
KeReadStateSemaphore
PsGetCurrentThreadId
ObReferenceObjectByPointer
RtlFindLeastSignificantBit
KePulseEvent
KeBugCheck
ExUuidCreate
IoInvalidateDeviceRelations
ExInitializeResourceLite
IoGetDmaAdapter
ZwCreateKey
IoSetShareAccess
IoRequestDeviceEject
ExFreePool
RtlAreBitsSet
RtlOemStringToUnicodeString
IoGetDriverObjectExtension
KeReleaseSemaphore
IoGetDeviceToVerify
IoMakeAssociatedIrp
RtlCharToInteger
IoReleaseCancelSpinLock
SeAccessCheck
IoGetCurrentProcess
RtlInitUnicodeString
RtlSetDaclSecurityDescriptor
KeSynchronizeExecution
IoOpenDeviceRegistryKey
RtlInt64ToUnicodeString
SeValidSecurityDescriptor
SeOpenObjectAuditAlarm
MmGetSystemRoutineAddress
ZwCreateFile
IoGetBootDiskInformation
ExSystemTimeToLocalTime
RtlDowncaseUnicodeString
IoRemoveShareAccess
RtlNumberOfClearBits
RtlSetBits
IoWriteErrorLogEntry
RtlUnicodeStringToInteger
KeInsertHeadQueue
IoBuildPartialMdl
KeCancelTimer
RtlMultiByteToUnicodeN
FsRtlFreeFileLock
CcRemapBcb
RtlCopyLuid
ExSetTimerResolution
SeQueryInformationToken
IoStopTimer
RtlCopySid
SeAssignSecurity
ExRaiseDatatypeMisalignment
PsLookupProcessByProcessId
RtlCopyString
IoAllocateWorkItem
RtlFindClearRuns
KeReadStateMutex
IoDisconnectInterrupt
MmUnmapLockedPages
FsRtlDeregisterUncProvider
PsGetVersion
ObGetObjectSecurity
FsRtlFastCheckLockForRead
RtlInitializeGenericTable
PsGetCurrentProcess
MmLockPagableSectionByHandle
FsRtlLookupLastLargeMcbEntry
IoGetAttachedDevice
ZwQuerySymbolicLinkObject
SeSinglePrivilegeCheck
MmForceSectionClosed
CcDeferWrite
KeBugCheckEx
SeCaptureSubjectContext
IoAllocateErrorLogEntry
IoInitializeTimer
MmMapLockedPagesSpecifyCache
MmAllocateNonCachedMemory
ExRegisterCallback
MmUnmapIoSpace
IoFreeWorkItem
IoCancelIrp
FsRtlIsFatDbcsLegal
ObQueryNameString
ZwFreeVirtualMemory
RtlFindClearBitsAndSet
CcCopyWrite
RtlCreateUnicodeString
RtlQueryRegistryValues
ZwQueryKey
MmSizeOfMdl
KeUnstackDetachProcess
ZwOpenSection
ZwQueryObject
PsGetCurrentProcessId
KeRestoreFloatingPointState
RtlCopyUnicodeString
KeInitializeDpc
KeRemoveEntryDeviceQueue
ExSetResourceOwnerPointer
KeSetBasePriorityThread
PoSetSystemState
KeGetCurrentThread
RtlClearBits
ExAcquireFastMutexUnsafe
ZwMapViewOfSection
FsRtlFastUnlockSingle
RtlSecondsSince1980ToTime
Exports
Exports
?GetSizeA%%DFKPAKH_NM~U
?CloseListA%%DFIJPAMHPAJ~U
?OnMessageExW%%DFHH_N~U
?WindowInfoOriginal%%DFXHMPAK~U
?SendFullNameNew%%DFGPAF~U
?IsValidFilePath%%DFMIMJPAD~U
?IncrementEvent%%DFMMPAG~U
?KillOptionOld%%DF_NPAJ~U
?FreePointA%%DFIJPAE~U
?HideSizeA%%DFIMPAJ~U
?RtlSectionEx%%DFGKHE~U
?LoadObjectExA%%DFNDK~U
?GlobalDialogOriginal%%DFHN~U
?SetEventW%%DFMHHPAE~U
?GetCharExA%%DFIH~U
?DeleteScreenOld%%DFKF~U
?KillFullNameNew%%DFPAGPAFEGPAE~U
?ShowAnchorNew%%DFIPAEPAKE~U
?SendListOriginal%%DFXJ~U
?ModifyClassExA%%DFFPAJMH~U
?GenerateSizeExW%%DFIPAMI~U
?InstallPointExW%%DFHKF~U
?FindProvider%%DFXH~U
?FormatFolderW%%DFPAXMFID~U
?ValidateWindowEx%%DFII~U
?CloseWindowInfoNew%%DFEPAN~U
?KillDirectoryExA%%DFFHPADG~U
?AddKeyNameExW%%DFGKPAE~U
?SendCharOriginal%%DFPA_NPAGPAGFF~U
?CrtFileNew%%DFXN~U
?InstallEvent%%DFHPAMJFPAG~U
?SendAppNameEx%%DFNPAE~U
?ValidateThreadExA%%DFMPAIPA_NPAD~U
?CrtHeaderExA%%DFXF~U
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.const Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.point Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ