L:\eyesflxgczj\xzzMhjXs\RncJwTu\yiKrkktyehhjha.pdb
Static task
static1
Behavioral task
behavioral1
Sample
445b13f2969af7ce9d86a73ee7eae2d6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
445b13f2969af7ce9d86a73ee7eae2d6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
445b13f2969af7ce9d86a73ee7eae2d6_JaffaCakes118
-
Size
63KB
-
MD5
445b13f2969af7ce9d86a73ee7eae2d6
-
SHA1
93aa9fd162d93861f51d9fc9dd4c40859f925a46
-
SHA256
86d0eaa69e6db71f2416672d71544054e2c1486536a75f571c7a50755290956a
-
SHA512
394cfb313f9035c6a16763d7a6e11cb2487062f2a29ec93da441a7f75d7b11fdf04c4a1418198b1d2913857afdb2740ec4582f1a9491a9d5ba87dee1efcb84bd
-
SSDEEP
1536:x7O58+K3OsmwUmpEGDJ/B/G6NC2Jf5gC:a8+K3VXpEG9JG6NC2Jf7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 445b13f2969af7ce9d86a73ee7eae2d6_JaffaCakes118
Files
-
445b13f2969af7ce9d86a73ee7eae2d6_JaffaCakes118.dll windows:5 windows x86 arch:x86
d25b0a17401d4b453576b459831aef01
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
IoGetAttachedDeviceReference
SeQueryAuthenticationIdToken
RtlTimeToTimeFields
ProbeForRead
MmUnsecureVirtualMemory
ZwCreateEvent
RtlFreeOemString
RtlIsNameLegalDOS8Dot3
CcPreparePinWrite
RtlTimeToSecondsSince1970
CcUnpinDataForThread
ZwReadFile
IoIsWdmVersionAvailable
SeCreateClientSecurity
ExRaiseAccessViolation
KeInitializeDpc
MmUnmapReservedMapping
KeSetSystemAffinityThread
RtlUnicodeToMultiByteN
RtlCreateRegistryKey
SeReleaseSubjectContext
PoUnregisterSystemState
FsRtlCheckLockForReadAccess
PsSetLoadImageNotifyRoutine
RtlVolumeDeviceToDosName
IoCreateDisk
IoRequestDeviceEject
RtlFindUnicodePrefix
DbgBreakPoint
RtlInitializeGenericTable
PsRevertToSelf
IoAllocateController
PsGetCurrentProcessId
KeAttachProcess
KeReadStateMutex
ExGetExclusiveWaiterCount
RtlAppendStringToString
ExLocalTimeToSystemTime
IoCheckEaBufferValidity
PsGetCurrentProcess
MmAllocatePagesForMdl
MmGetSystemRoutineAddress
IoBuildPartialMdl
IoSetHardErrorOrVerifyDevice
RtlFindNextForwardRunClear
RtlDowncaseUnicodeString
KeLeaveCriticalRegion
KeQueryActiveProcessors
IoConnectInterrupt
MmFlushImageSection
RtlInitAnsiString
KeDelayExecutionThread
MmMapLockedPagesSpecifyCache
IoReportResourceForDetection
FsRtlAllocateFileLock
MmHighestUserAddress
ExSystemTimeToLocalTime
KeBugCheck
RtlInitUnicodeString
ZwOpenSection
IoGetDeviceObjectPointer
MmQuerySystemSize
KeDetachProcess
RtlDeleteNoSplay
IoCsqRemoveIrp
KdEnableDebugger
IoIsOperationSynchronous
RtlEqualString
CcSetReadAheadGranularity
IoCreateFile
IoReadDiskSignature
IoDeviceObjectType
IoIsSystemThread
MmIsThisAnNtAsSystem
PoSetPowerState
PoSetSystemState
KeSynchronizeExecution
IoInitializeRemoveLockEx
FsRtlIsFatDbcsLegal
KeQueryInterruptTime
IoGetDeviceInterfaceAlias
RtlSecondsSince1970ToTime
MmAllocateContiguousMemory
RtlUnicodeStringToOemString
ObfReferenceObject
RtlValidSecurityDescriptor
MmBuildMdlForNonPagedPool
RtlCreateAcl
RtlVerifyVersionInfo
MmSecureVirtualMemory
IoMakeAssociatedIrp
ZwWriteFile
ZwQuerySymbolicLinkObject
PsTerminateSystemThread
ExGetPreviousMode
IoUnregisterFileSystem
PsLookupProcessByProcessId
MmCanFileBeTruncated
PoRequestPowerIrp
RtlxUnicodeStringToAnsiSize
ObReferenceObjectByHandle
FsRtlIsHpfsDbcsLegal
KeQuerySystemTime
RtlInitializeUnicodePrefix
KeResetEvent
IoReleaseVpbSpinLock
RtlCreateUnicodeString
IoBuildSynchronousFsdRequest
IoAllocateMdl
SeSetSecurityDescriptorInfo
RtlInsertUnicodePrefix
PsCreateSystemThread
ZwCreateSection
SeAssignSecurity
RtlUpcaseUnicodeString
IoAllocateAdapterChannel
FsRtlFastCheckLockForRead
RtlNumberOfClearBits
RtlCompareString
FsRtlCheckLockForWriteAccess
IoFreeWorkItem
RtlValidSid
ObReferenceObjectByPointer
IoGetAttachedDevice
RtlLengthRequiredSid
RtlAddAccessAllowedAceEx
MmMapLockedPages
KeInsertHeadQueue
ZwOpenSymbolicLinkObject
MmFreeContiguousMemory
IoSetStartIoAttributes
KeRemoveQueue
ZwDeleteValueKey
IoAllocateWorkItem
KeInsertQueueDpc
CcCopyRead
ObOpenObjectByPointer
ZwCreateFile
KeFlushQueuedDpcs
PsGetThreadProcessId
KeSetPriorityThread
ZwQueryKey
IoCreateSynchronizationEvent
PsGetVersion
RtlUnicodeStringToInteger
KeSetTimer
FsRtlGetNextFileLock
MmFreeMappingAddress
PsGetCurrentThreadId
ObfDereferenceObject
IoSetPartitionInformation
ExUnregisterCallback
IoGetDmaAdapter
RtlUnicodeToOemN
MmAllocateNonCachedMemory
RtlStringFromGUID
MmProbeAndLockProcessPages
RtlFillMemoryUlong
RtlInt64ToUnicodeString
ExAcquireFastMutexUnsafe
ExAllocatePoolWithQuotaTag
ExDeleteNPagedLookasideList
RtlExtendedIntegerMultiply
PsReturnPoolQuota
IoSetSystemPartition
IoAllocateIrp
ZwSetVolumeInformationFile
ObInsertObject
RtlCopySid
ObQueryNameString
RtlWriteRegistryValue
ExRaiseStatus
IoRegisterFileSystem
RtlDeleteElementGenericTable
IoGetBootDiskInformation
CcMapData
FsRtlIsTotalDeviceFailure
RtlAddAccessAllowedAce
RtlInitializeBitMap
MmAllocateMappingAddress
MmUnlockPagableImageSection
RtlFindSetBits
IoGetDeviceInterfaces
CcCopyWrite
PsIsThreadTerminating
SeDeassignSecurity
FsRtlNotifyUninitializeSync
ZwQueryVolumeInformationFile
RtlCreateSecurityDescriptor
CcCanIWrite
FsRtlDeregisterUncProvider
ExVerifySuite
RtlUnicodeStringToAnsiString
RtlCheckRegistryKey
CcMdlWriteAbort
PsChargeProcessPoolQuota
HalExamineMBR
IoVolumeDeviceToDosName
RtlGetNextRange
ZwOpenFile
RtlDeleteRegistryValue
KeSetTargetProcessorDpc
PoRegisterSystemState
FsRtlIsDbcsInExpression
MmIsVerifierEnabled
RtlRemoveUnicodePrefix
IoCheckQuotaBufferValidity
IoStartPacket
RtlHashUnicodeString
KeRemoveByKeyDeviceQueue
IoWriteErrorLogEntry
SeUnlockSubjectContext
ZwOpenKey
RtlCopyLuid
KeGetCurrentThread
FsRtlFreeFileLock
RtlFindLastBackwardRunClear
DbgBreakPointWithStatus
MmIsAddressValid
RtlNtStatusToDosError
CcPinMappedData
SeDeleteObjectAuditAlarm
FsRtlFastUnlockSingle
PsImpersonateClient
ZwDeviceIoControlFile
KeSetEvent
ObGetObjectSecurity
RtlIntegerToUnicodeString
KeReadStateTimer
ZwFreeVirtualMemory
RtlSplay
DbgPrompt
IoAcquireCancelSpinLock
KdDisableDebugger
RtlFindClearBits
KeCancelTimer
IoAcquireVpbSpinLock
KeInsertDeviceQueue
IoDetachDevice
PsReferencePrimaryToken
RtlFindClearBitsAndSet
ZwPowerInformation
IoQueryFileInformation
RtlOemStringToUnicodeString
IoGetDriverObjectExtension
KeInitializeEvent
RtlAnsiCharToUnicodeChar
KeSetImportanceDpc
RtlTimeToSecondsSince1980
ExDeletePagedLookasideList
FsRtlLookupLastLargeMcbEntry
IoRegisterDeviceInterface
ZwFlushKey
RtlUpperChar
RtlSetBits
IoOpenDeviceRegistryKey
ZwClose
RtlCopyString
IoRemoveShareAccess
Exports
Exports
?HideList@@YGEKPAI&U
?SetDialogExA@@YGFDHIK&U
?CallSystemOriginal@@YGPAK_NPAHED&U
?InstallProfileEx@@YGPAGGN&U
?IncrementTimerA@@YGFPAN&U
?ValidateTimerNew@@YGIHN&U
?CallDateEx@@YGHPAE&U
?GetMediaTypeNew@@YGGF&U
?PutConfigExW@@YGXGGPAKPAK&U
?CallStringNew@@YGKPAH&U
?GlobalStateEx@@YGPAEGG&U
?CloseFileNew@@YGMPAGPAMPAM&U
?RtlDeviceEx@@YGPAKEGHPAD&U
?InsertValueEx@@YGMFPAEGPAH&U
?IsValidFilePathOriginal@@YGFPAH&U
?InstallComponentA@@YGFIPAM_NJ&U
?HeightOld@@YGDKPAGPAMPAK&U
?RtlEventNew@@YGFFPAN&U
?CancelEventEx@@YGPAHPAHPAI&U
?GetAnchorEx@@YG_ND&U
?CancelMemoryExA@@YGPAXPADGGD&U
?WidthExA@@YGKE&U
?ArgumentOriginal@@YGPADG&U
?RemoveTextNew@@YGPAIPAE&U
?RtlFullNameW@@YGMPAJPAEFPAD&U
?SetFolderNew@@YGGPAFGF&U
?KillPointerOriginal@@YG_NJFD&U
?KillDataOriginal@@YGPAM_NPAHG&U
?CopyPointerOriginal@@YGPAXPAHJGH&U
?EnumStringOld@@YGPADPA_NPAD&U
?CloseModuleA@@YGFID&U
?KillFileEx@@YGKPADHFPAM&U
?CrtDeviceExW@@YGPAGEPAH_NG&U
?ValidateFileExA@@YGMD&U
?SetValueExW@@YGIMKEH&U
?CancelPenExA@@YGHPANPAJPAEPA_N&U
?GetClassOriginal@@YGPADDG&U
?KillVersionA@@YGXHI&U
Sections
.text Size: 29KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.i_data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.e_data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hostc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hosta Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hostb Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hostd Size: 1024B - Virtual size: 657B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 684B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ