ntvdm.pdb
Static task
static1
Behavioral task
behavioral1
Sample
62016d69d0485beda6f196045c7262d9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
62016d69d0485beda6f196045c7262d9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62016d69d0485beda6f196045c7262d9_JaffaCakes118
-
Size
430KB
-
MD5
62016d69d0485beda6f196045c7262d9
-
SHA1
e2f3ae1d71322298cd732d42e6d1b3f27a6509f3
-
SHA256
3043a95ae08c5b345c3d4ee90702d6708610a4c7c0cc7932599dad8b5e9e274f
-
SHA512
64daf6b619f7146b84e326a8b0c012a222639084b53b6f91ae3d62490b2a97a1f92bfe6cbf95f564f634cddbca3e90f25e788af15d593cadfa6ea58d035b3f71
-
SSDEEP
12288:eXeKNA4rZl3m+r4NIrOf6Wa0P1zICmfhWPOVfGnZx:eOK+q8+rSyjyOJWPOVox
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 62016d69d0485beda6f196045c7262d9_JaffaCakes118
Files
-
62016d69d0485beda6f196045c7262d9_JaffaCakes118.exe windows:5 windows x86 arch:x86
bd44d5addbd94c9d97c47140f319abca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetVersionExA
HeapAlloc
ExitProcess
GetProcAddress
GetModuleHandleA
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
GetCommandLineA
GetSystemTimeAsFileTime
RtlUnwind
InterlockedExchange
VirtualQuery
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
LCMapStringA
MultiByteToWideChar
LCMapStringW
ReadFile
FlushFileBuffers
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
VirtualProtect
GetSystemInfo
SetFilePointer
CloseHandle
SetStdHandle
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
HeapReAlloc
TerminateProcess
GetConsoleKeyboardLayoutNameA
SetVDMCurrentDirectories
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
DebugBreak
GetLocalTime
Sleep
WaitForSingleObjectEx
ExitThread
SetEvent
InitializeCriticalSection
CreateEventA
SetThreadPriority
CreateThread
RaiseException
FormatMessageA
FindClose
CreateFileA
FindFirstFileA
GetFileSize
SetLastError
SetPriorityClass
GetPriorityClass
GetSystemDirectoryA
TlsAlloc
GetSystemDefaultLangID
IsBadCodePtr
WaitForSingleObject
TlsSetValue
TlsGetValue
PulseEvent
ResumeThread
DuplicateHandle
GetCurrentThread
LeaveCriticalSection
EnterCriticalSection
ClearCommError
GetOverlappedResult
SetCommState
DeleteCriticalSection
WaitForMultipleObjects
SetCommTimeouts
GetCommTimeouts
SetupComm
GetCommState
EscapeCommFunction
ClearCommBreak
SetCommBreak
OutputDebugStringA
GetConsoleDisplayMode
GetThreadContext
GlobalMemoryStatus
SetCurrentDirectoryA
SetEnvironmentVariableA
SetConsoleTitleA
GetConsoleTitleA
ReadConsoleOutputA
SetConsoleCursorPosition
GetConsoleCursorInfo
GetConsoleOutputCP
GetConsoleScreenBufferInfo
SetConsoleCursorInfo
WriteConsoleOutputA
SetConsoleWindowInfo
SetConsoleScreenBufferSize
SetConsoleMode
GetConsoleMode
Beep
SetConsoleActiveScreenBuffer
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
GetConsoleFontSize
GetCurrentConsoleFont
WriteConsoleA
CreateConsoleScreenBuffer
DeviceIoControl
ReleaseMutex
SetConsoleCtrlHandler
CreateMutexA
_lclose
_lread
_llseek
_lopen
GetSystemWindowsDirectoryA
GetFileAttributesA
GetWindowsDirectoryA
SuspendThread
FreeLibrary
IsDebuggerPresent
LocalFree
LocalAlloc
CreateSemaphoreA
ReleaseSemaphore
ResetEvent
lstrcmpiA
FileTimeToDosDateTime
FileTimeToLocalFileTime
QueryDosDeviceW
GetShortPathNameW
IsDBCSLeadByte
GetFileAttributesW
DefineDosDeviceW
FindNextFileW
FindFirstFileW
GetDriveTypeA
CreateDirectoryW
RemoveDirectoryW
MoveFileW
LocalFileTimeToFileTime
GetDriveTypeW
GetFileTime
SetFileTime
SystemTimeToFileTime
GetSystemTime
SetEndOfFile
CreateFileW
DeleteFileW
GetFileInformationByHandle
GetEnvironmentVariableA
GetCompressedFileSizeW
SetFileAttributesW
SetLocalTime
SetErrorMode
SetVolumeLabelA
UnlockFile
LockFile
CreateDirectoryA
GetShortPathNameA
DeleteFileA
GetTempPathA
TerminateThread
GetTempFileNameA
SearchPathA
GetConsoleCP
GetBinaryTypeA
GetExitCodeProcess
CreateProcessA
SearchPathW
GetTempFileNameW
ExpandEnvironmentStringsA
MoveFileExW
GetDiskFreeSpaceW
GetVolumeInformationW
GetComputerNameW
VirtualUnlock
GetNextVDMCommand
ExitVDM
SetConsoleDisplayMode
SetConsoleKeyShortcuts
GetConsoleHardwareState
SetConsoleHardwareState
RegisterConsoleVDM
SetConsolePalette
ConsoleMenuControl
ShowConsoleCursor
VDMConsoleOperation
WriteConsoleInputVDMW
ReadConsoleInputExW
GetConsoleInputWaitHandle
SetLastConsoleEventActive
InvalidateConsoleDIBits
GetProcessHeap
ntdll
NtClose
NtEnumerateValueKey
NtOpenKey
RtlInitUnicodeString
RtlUnicodeStringToAnsiString
NtQueryInformationProcess
RtlTimeToTimeFields
RtlTimeFieldsToTime
NtAlertThread
NtQueryPerformanceCounter
RtlExtendedLargeIntegerDivide
NtWaitForMultipleObjects
RtlExtendedIntegerMultiply
RtlLeaveCriticalSection
RtlEnterCriticalSection
NtTerminateProcess
RtlInitializeCriticalSection
NtVdmControl
RtlUnicodeStringToOemString
RtlAnsiStringToUnicodeString
RtlInitString
RtlOemStringToUnicodeString
RtlFreeUnicodeString
NtRaiseHardError
RtlInitAnsiString
RtlNtStatusToDosError
NtAllocateVirtualMemory
NtCreateFile
NtDeviceIoControlFile
RtlFillMemoryUlong
NtOpenFile
NtQueryInformationFile
NtFsControlFile
NtWaitForSingleObject
NtMapViewOfSection
NtUnmapViewOfSection
NtCreateSection
NtQueryValueKey
NtFreeVirtualMemory
RtlOemToUnicodeN
NtGetContextThread
NtQueryInformationThread
NtDuplicateObject
NtSetContextThread
DbgPrint
DbgPrompt
NtSetInformationFile
_strcmpi
RtlEqualUnicodeString
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
RtlAppendUnicodeToString
RtlFreeAnsiString
NtQueryObject
NtQueryVolumeInformationFile
RtlFreeHeap
NtQueryDirectoryFile
RtlCompareUnicodeString
RtlUpcaseUnicodeStringToCountedOemString
RtlIsNameLegalDOS8Dot3
RtlIsDosDeviceName_U
RtlAllocateHeap
RtlCreateUnicodeString
RtlDosPathNameToNtPathName_U
RtlUnicodeStringToCountedOemString
RtlUpcaseUnicodeChar
RtlGetFullPathName_U
RtlDetermineDosPathNameType_U
RtlReAllocateHeap
RtlAppendUnicodeStringToString
RtlGenerate8dot3Name
NtQueryFullAttributesFile
RtlDestroyEnvironment
RtlSetEnvironmentVariable
RtlCreateEnvironment
RtlxUnicodeStringToOemSize
NlsMbOemCodePageTag
RtlReleasePebLock
RtlAcquirePebLock
RtlFreeOemString
RtlSetCurrentDirectory_U
NtQuerySystemInformation
NtQueryVirtualMemory
RtlCharToInteger
advapi32
RegOpenKeyExA
RegQueryInfoKeyA
RegCloseKey
RegQueryValueExA
RegEnumValueA
gdi32
SetPaletteEntries
SelectPalette
RemoveFontResourceW
CreatePalette
user32
wsprintfA
GetKeyboardType
CharToOemBuffA
OemToCharA
CharUpperBuffW
MapVirtualKeyA
LoadStringA
LoadStringW
GetWindowThreadProcessId
SendMessageA
ShowWindow
SetWindowPos
ScreenToClient
GetWindowRect
GetDlgItem
GetSystemMetrics
GetDesktopWindow
GetUserObjectInformationA
GetThreadDesktop
SetWindowLongA
SetWindowTextA
LoadIconA
EndDialog
SendDlgItemMessageA
GetWindowLongA
DialogBoxParamA
SetForegroundWindow
DefWindowProcA
EnumWindows
ShowStartGlass
FindWindowA
GetForegroundWindow
MessageBeep
SetCursorPos
GetCursorPos
ClipCursor
DeleteMenu
AppendMenuW
ModifyMenuW
GetClipCursor
GetKeyState
PostMessageA
wvsprintfA
VkKeyScanW
Exports
Exports
BlockWOWIdle
CurrentMonitorTeb
DBGNotifyDebugged
DBGNotifyNewTask
DBGNotifyRemoteThreadAddress
DispatchInterrupts
Dos_Flag_Addr
DpmiSetIncrementalAlloc
ExpLdt
FlatAddress
GetDOSAppName
GetWOWShortCutInfo
IsCdRomFile
MGetVdmPointer
RegisterWOWIdle
ResumeTimerThread
SelectorLimit
SetShadowDescriptorEntries
Sim32pGetVDMPointer
SoftPcEoi
SuspendTimerThread
VDDAllocMem
VDDAllocateDosHandle
VDDAssociateNtHandle
VDDDeInstallIOHook
VDDDeInstallMemoryHook
VDDDeInstallUserHook
VDDExcludeMem
VDDFreeMem
VDDIncludeMem
VDDInstallIOHook
VDDInstallMemoryHook
VDDInstallUserHook
VDDQueryDMA
VDDReleaseDosHandle
VDDReleaseIrqLine
VDDRequestDMA
VDDReserveIrqLine
VDDRetrieveNtHandle
VDDSetDMA
VDDSimulate16
VDDTerminateVDM
VdmDbgAttach
VdmGetParametersInfoError
VdmMapFlat
VdmParametersInfo
VdmTraceEvent
WOWSysErrorBox
WaitIfIdle
call_ica_hw_interrupt
cmdCheckTemp
cmdCheckTempInit
cpu_createthread
demClientErrorEx
demFileDelete
demFileFindFirst
demFileFindNext
demGetCurrentDirectoryLCDS
demGetFileTimeByHandle_WOW
demGetPhysicalDriveType
demIsShortPathName
demLFNCleanup
demLFNGetCurrentDirectory
demSetCurrentDirectoryGetDrive
demSetCurrentDirectoryLCDS
demWOWLFNAllocateSearchHandle
demWOWLFNCloseSearchHandle
demWOWLFNEntry
demWOWLFNGetSearchHandle
demWOWLFNInit
fSeparateWow
getAF
getAH
getAL
getAX
getBH
getBL
getBP
getBX
getCF
getCH
getCL
getCS
getCX
getDF
getDH
getDI
getDL
getDS
getDX
getEAX
getEBP
getEBX
getECX
getEDI
getEDX
getEFLAGS
getEIP
getES
getESI
getESP
getFS
getGS
getIF
getIP
getIntelRegistersPointer
getMSW
getOF
getPF
getSF
getSI
getSP
getSS
getZF
host_CreateThread
host_ExitThread
host_com_close
host_direct_access_error
host_simulate
pDeviceChain
setAF
setAH
setAL
setAX
setBH
setBL
setBP
setBX
setCF
setCH
setCL
setCS
setCX
setDF
setDH
setDI
setDL
setDS
setDX
setEAX
setEBP
setEBX
setECX
setEDI
setEDX
setEFLAGS
setEIP
setES
setESI
setESP
setFS
setGS
setIF
setIP
setMSW
setOF
setPF
setSF
setSI
setSP
setSS
setZF
Sections
.text Size: 383KB - Virtual size: 382KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 19KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE