S:\mxefdjyfbygl\fJpMqIJkrtClnn\nXswbjHIwmBVp\pfffmyyVPFunx.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4a52dd7afe5bb0a954b7865324d0bac3_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a52dd7afe5bb0a954b7865324d0bac3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4a52dd7afe5bb0a954b7865324d0bac3_JaffaCakes118
-
Size
445KB
-
MD5
4a52dd7afe5bb0a954b7865324d0bac3
-
SHA1
9bc9082f6664a0562e38f4fdb762fbd9465ee101
-
SHA256
c2825d367e410b2d3f07c89751c4fa9d542e0d56f846121ffd0991f7ad4747b6
-
SHA512
c70b638c79e24e747ed5fda62a42f88a0632ddbe8453b6ce57d5e8bb100adc852afcaff755d550725138222aca389981ebf8cb691ac97fe8c20ca5b71d49660e
-
SSDEEP
6144:MMPUcgZEKTHAJiKXi4LE4wxHObJ2LG24z/3nZr26tVrl/tg5o8jOcfDvecdQs:MaUzBtKy4LE4wxubJ2Li73ZpjgRdKWQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a52dd7afe5bb0a954b7865324d0bac3_JaffaCakes118
Files
-
4a52dd7afe5bb0a954b7865324d0bac3_JaffaCakes118.dll windows:5 windows x86 arch:x86
3d019df3efa33cb45be53236588e9094
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
IoDeleteSymbolicLink
MmForceSectionClosed
RtlFreeUnicodeString
KeEnterCriticalRegion
KeLeaveCriticalRegion
RtlDeleteElementGenericTable
ZwSetSecurityObject
KdDisableDebugger
IoGetDeviceToVerify
IoCheckEaBufferValidity
CcFastCopyRead
HalExamineMBR
RtlFindClearBitsAndSet
ProbeForRead
IoDeviceObjectType
KeGetCurrentThread
ObInsertObject
IoSetShareAccess
RtlCreateSecurityDescriptor
MmIsThisAnNtAsSystem
RtlFindClearBits
KeInitializeTimer
IoQueueWorkItem
ZwDeleteKey
RtlQueryRegistryValues
IoGetTopLevelIrp
IoInvalidateDeviceRelations
FsRtlCheckLockForReadAccess
ExUnregisterCallback
IoReleaseCancelSpinLock
IoGetBootDiskInformation
KeRestoreFloatingPointState
SeTokenIsRestricted
IoSetTopLevelIrp
ObGetObjectSecurity
PoUnregisterSystemState
IoGetDeviceAttachmentBaseRef
KeQueryInterruptTime
KeTickCount
PsDereferencePrimaryToken
IoGetDiskDeviceObject
MmFreeNonCachedMemory
IoCheckShareAccess
MmFreeMappingAddress
MmHighestUserAddress
IoVerifyVolume
ZwQuerySymbolicLinkObject
RtlAnsiStringToUnicodeString
CcPinMappedData
ExSystemTimeToLocalTime
DbgBreakPointWithStatus
KeReadStateMutex
KeInitializeEvent
ExGetExclusiveWaiterCount
Exports
Exports
?RtlDirectoryExW@@YGPADHPAG<V
?DeleteVersionExW@@YGGD<V
?FindSectionA@@YGFFPA_NGM<V
?ModifyPathExW@@YGKK<V
?SetFilePathW@@YGIPAJJIPAJ<V
?IsNotFileEx@@YGMPAMDF<V
Sections
.text Size: 45KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE