E:\pHQECvUSzhOym\RhqcbBvtf\cfWyulvspXTfvh\gsUwoWvjoz\nVyjYujJjyjnmz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2f993b1e849b69a382a5ecb44645a14c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2f993b1e849b69a382a5ecb44645a14c_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2f993b1e849b69a382a5ecb44645a14c_JaffaCakes118
-
Size
331KB
-
MD5
2f993b1e849b69a382a5ecb44645a14c
-
SHA1
d2d518ed9bce533848f46b701d540294caa489f2
-
SHA256
2c7b0fbcde774bb2e683601438f7737ac0fa774ecedcf50aa4ca9bb7f099e14c
-
SHA512
ae4741312849a4010cc6bc1c44d7fa0dbf74cbef399e39ab0b5541075feac29c9be25fc23b3265784d66375e97addc4c45932280443f723cf795c1086c4ef4bc
-
SSDEEP
6144:IweHzS5JgPCuLj5la/n/jtglEoa4vHg+u83lyn1q+/jst8KHfjIckkQYdWihh19:IweHz6Jg6u3a6lZa4fg+e1q+/4ttHfjH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2f993b1e849b69a382a5ecb44645a14c_JaffaCakes118
Files
-
2f993b1e849b69a382a5ecb44645a14c_JaffaCakes118.dll windows:5 windows x86 arch:x86
62258214c05ac8f21a3b5c578655160d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
IoCheckQuotaBufferValidity
ZwCreateKey
DbgBreakPoint
IoAllocateIrp
IoCreateStreamFileObjectLite
KeSynchronizeExecution
IoReadPartitionTableEx
KeInitializeQueue
IoInvalidateDeviceState
MmAllocateMappingAddress
ExSystemTimeToLocalTime
RtlTimeToSecondsSince1970
IoGetTopLevelIrp
RtlNumberOfClearBits
KeQueryInterruptTime
KeGetCurrentThread
IoGetRelatedDeviceObject
IoFreeIrp
IoUnregisterFileSystem
RtlCopyUnicodeString
IoConnectInterrupt
KeTickCount
IoSetPartitionInformation
CcFastCopyWrite
IoInvalidateDeviceRelations
CcUninitializeCacheMap
ObReleaseObjectSecurity
RtlFindClearBitsAndSet
KeReadStateMutex
MmForceSectionClosed
MmFreePagesFromMdl
RtlCharToInteger
IoSetThreadHardErrorMode
CcMdlRead
RtlTimeFieldsToTime
IoIsWdmVersionAvailable
KeInsertByKeyDeviceQueue
PsReferencePrimaryToken
IoReadDiskSignature
RtlVerifyVersionInfo
ZwSetSecurityObject
IoGetBootDiskInformation
RtlFreeOemString
MmUnsecureVirtualMemory
SeAccessCheck
ZwQueryObject
PsChargeProcessPoolQuota
DbgBreakPointWithStatus
KeEnterCriticalRegion
ExDeletePagedLookasideList
CcGetFileObjectFromBcb
ObfReferenceObject
MmFreeMappingAddress
IoGetDeviceProperty
CcRepinBcb
KeClearEvent
ZwEnumerateKey
ZwCreateSection
RtlEqualUnicodeString
IoThreadToProcess
ExCreateCallback
CcPreparePinWrite
SeDeassignSecurity
IoGetInitialStack
CcSetReadAheadGranularity
ZwWriteFile
RtlCreateSecurityDescriptor
RtlEqualString
RtlDeleteNoSplay
KeWaitForSingleObject
RtlCreateAcl
CcUnpinData
KeLeaveCriticalRegion
KeSetTimerEx
IoCancelIrp
IoSetHardErrorOrVerifyDevice
KeInitializeTimer
RtlCheckRegistryKey
Exports
Exports
?LoadFilePathExA@@YGHK<V
?ModifyWindowInfoA@@YGFPAN<V
?RtlMonitorOld@@YGXK_NK<V
?KillKeyNameW@@YGMJE<V
?GetFile@@YGXPADHPAJPA_N<V
?InvalidateFileExA@@YGIPAKK<V
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vdat Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ