N:\gsSfqOxzaouku\tZxtIJgdI\ddRwBakosKfA.pdb
Static task
static1
Behavioral task
behavioral1
Sample
36bb5382b12889d26a0c7f3b0b9bf213_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
36bb5382b12889d26a0c7f3b0b9bf213_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
36bb5382b12889d26a0c7f3b0b9bf213_JaffaCakes118
-
Size
73KB
-
MD5
36bb5382b12889d26a0c7f3b0b9bf213
-
SHA1
59aaf26a22a97efa4df615062dc8a118f81e3b4b
-
SHA256
ef515fb13c5365c20727dd7e3ee8573c6232b32b1c67f60038733083109e5655
-
SHA512
9ab0b8e23689f37d37475a0b63e4d47a24eca9178e543d66675fe4f7ca35f29b309d16b85df6c1f091f5b30ec8a305f179d271119361c16a70b1d574b294aa16
-
SSDEEP
1536:knKLj+PHV8n3SxAbFiKAqUEy+lyL47vN:kKLqwbFMDEy/LYvN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36bb5382b12889d26a0c7f3b0b9bf213_JaffaCakes118
Files
-
36bb5382b12889d26a0c7f3b0b9bf213_JaffaCakes118.dll windows:5 windows x86 arch:x86
4fe198dd3fcb43dc947ed220ea075142
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
IoDetachDevice
KeEnterCriticalRegion
ZwReadFile
KeSetBasePriorityThread
PsGetCurrentThread
RtlAnsiCharToUnicodeChar
RtlInitializeSid
ZwFsControlFile
ExAllocatePoolWithQuota
IoInvalidateDeviceRelations
CcUnpinDataForThread
SeAssignSecurity
KeRemoveDeviceQueue
RtlUnicodeStringToAnsiString
ExDeleteResourceLite
RtlCreateSecurityDescriptor
KeRestoreFloatingPointState
IoThreadToProcess
SeTokenIsAdmin
KeTickCount
MmSetAddressRangeModified
IoDeleteController
PsImpersonateClient
IoSetHardErrorOrVerifyDevice
SeAppendPrivileges
KeRundownQueue
IoGetLowerDeviceObject
IoGetDeviceToVerify
CcFastMdlReadWait
RtlWriteRegistryValue
SeSinglePrivilegeCheck
RtlCopyUnicodeString
ExDeleteNPagedLookasideList
ExLocalTimeToSystemTime
RtlLengthSecurityDescriptor
RtlCompareString
KeLeaveCriticalRegion
RtlOemToUnicodeN
RtlSetBits
IoRequestDeviceEject
MmUnmapLockedPages
SeTokenIsRestricted
KeGetCurrentThread
RtlFindUnicodePrefix
FsRtlCheckOplock
ExAcquireFastMutexUnsafe
IoGetTopLevelIrp
PoStartNextPowerIrp
IoCreateFile
Exports
Exports
?GenerateArgument@@YGFHFF<V
?OnComponentExW@@YGEI<V
?FindDeviceExW@@YGXM<V
?EnumMonitorA@@YGKMPAN<V
?IncrementName@@YGJJPAHE<V
?CrtProjectExW@@YGHD<V
Sections
.text Size: 45KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE