Static task
static1
Behavioral task
behavioral1
Sample
48d37f23910cdc8c92ae5c92f9fc6c2d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
48d37f23910cdc8c92ae5c92f9fc6c2d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
48d37f23910cdc8c92ae5c92f9fc6c2d_JaffaCakes118
-
Size
183KB
-
MD5
48d37f23910cdc8c92ae5c92f9fc6c2d
-
SHA1
4e03e1f9c7b373c3769bf48460e2e60a0d8ad247
-
SHA256
9b873df2823c7cd08e619c129246d3addac575db1960ffa245430fe179846c52
-
SHA512
91f5c94ff13ff6e4fc02a9f53e2602341398482a95fe279cae1f3bcc73647c666cf9ed4fb37aece4c86942adde95a7f975ea5562048e61941a49200fbb885ae9
-
SSDEEP
3072:B9f3bXYVm+1eRg0AoT+JGuy+zq8fflpwnYlnptV:B97Um+1eG0AoT6Guy+ff9pWYlnpt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48d37f23910cdc8c92ae5c92f9fc6c2d_JaffaCakes118
Files
-
48d37f23910cdc8c92ae5c92f9fc6c2d_JaffaCakes118.dll windows:4 windows x86 arch:x86
d0cf2d296a9bf6f82b0995a0429044ef
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntoskrnl.exe
_except_handler3
ZwFreeVirtualMemory
ZwAllocateVirtualMemory
wcslen
_wcsnicmp
wcschr
mbstowcs
ZwQueryObject
ZwDuplicateObject
PsGetCurrentProcessId
KeUnstackDetachProcess
ObfDereferenceObject
KeServiceDescriptorTable
KeStackAttachProcess
PsLookupProcessByProcessId
RtlNtStatusToDosError
MmUnmapIoSpace
KeNumberProcessors
MmHighestUserAddress
MmGetVirtualForPhysical
MmMapIoSpace
_allshr
memmove
KeDelayExecutionThread
_allmul
ZwRequestWaitReplyPort
PsGetCurrentThreadId
strncat
strncmp
wcsncpy
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
RtlInitUnicodeString
wcscat
wcsrchr
KeSetEvent
ZwWaitForSingleObject
_strnicmp
strrchr
KeWaitForSingleObject
KeInitializeEvent
_vsnprintf
ObReferenceObjectByHandle
ObOpenObjectByName
ObfReferenceObject
IoGetDeviceObjectPointer
IofCompleteRequest
ExFreePoolWithTag
KeInsertQueueApc
KeInitializeApc
ExAllocatePoolWithTag
strchr
ExQueueWorkItem
KeQuerySystemTime
ZwQueryKey
wcsncmp
ZwDeleteKey
ZwDeleteValueKey
ZwOpenKey
swprintf
ZwEnumerateValueKey
ZwEnumerateKey
ZwDeleteFile
ZwUnloadKey
ZwLoadKey
IoFileObjectType
ExGetPreviousMode
IoGetCurrentProcess
strncpy
ZwOpenEvent
ZwSetValueKey
ZwCreateKey
ZwWriteFile
ZwOpenProcess
IoCreateFile
RtlCompareUnicodeString
ObReferenceObjectByName
IoDriverObjectType
wcscpy
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
_wcsicmp
ObOpenObjectByPointer
strstr
_strlwr
_snwprintf
IofCallDriver
PsSetCreateProcessNotifyRoutine
SeSinglePrivilegeCheck
SeExports
MmMapViewOfSection
IoCreateDevice
ZwFlushVirtualMemory
KeInitializeMutex
KeReleaseMutex
ZwQuerySystemInformation
RtlQueryRegistryValues
KeQueryTimeIncrement
KeTickCount
_alldiv
ZwReadFile
ZwSetInformationFile
RtlCharToInteger
PsLookupProcessThreadByCid
KeReadStateEvent
KeInsertQueueDpc
KeSetTargetProcessorDpc
KeSetImportanceDpc
KeInitializeDpc
PsGetVersion
IoFreeMdl
MmProbeAndLockPages
IoAllocateMdl
MmUnlockPages
MmMapLockedPagesSpecifyCache
MmUnmapLockedPages
KeAddSystemServiceTable
KeInitializeSemaphore
KeReleaseSemaphore
rand
PsCreateSystemThread
RtlMultiByteToUnicodeN
RtlUnicodeToMultiByteN
IoBuildDeviceIoControlRequest
sprintf
RtlAnsiStringToUnicodeString
RtlInitAnsiString
RtlFreeUnicodeString
ZwFsControlFile
atoi
IoCancelIrp
IoDeleteDevice
ExfInterlockedInsertTailList
MmUserProbeAddress
ProbeForRead
SeSetSecurityDescriptorInfo
_allrem
ExfInterlockedRemoveHeadList
vsprintf
ZwPulseEvent
MmMapLockedPages
_stricmp
RtlCreateSecurityDescriptor
RtlSetDaclSecurityDescriptor
ZwCreateEvent
ZwQueryInformationProcess
NtClose
ZwOpenThread
hal
KfRaiseIrql
KfAcquireSpinLock
KfReleaseSpinLock
KeRaiseIrqlToDpcLevel
KfLowerIrql
KeGetCurrentIrql
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.basein Size: 512B - Virtual size: 125B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 73KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ