Z:\zwHMDlgCrYg\YyucdyNwriu\hawjupxMixxmy\utvtcJPoHm\ssbJrWaNvdiCP.pdb
Static task
static1
Behavioral task
behavioral1
Sample
78693494b0b98f0c57574253dfb4fd60_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
78693494b0b98f0c57574253dfb4fd60_JaffaCakes118.dll
Resource
win10v2004-20240729-en
General
-
Target
78693494b0b98f0c57574253dfb4fd60_JaffaCakes118
-
Size
39KB
-
MD5
78693494b0b98f0c57574253dfb4fd60
-
SHA1
a154db3143e5d97b6a6544ee3aee6d96c007f7c0
-
SHA256
872e9082f9f4431ba1406b440a78c77ee0363483476ddafa6c427ce6dfc78eb7
-
SHA512
62dd9c612e434886f351619917f5c94e7915abe9bd35c7cea841400e7d802c6e06c525646e717f93867c9f3b753cfad77bbbff46972bf02d80c3fb0cec51b6a7
-
SSDEEP
768:XDJ9Pi6jF4yeO8topEbxtQxPyid6e4rw2JPBvFl9mgJ:TJg6jFeBWPfdMPJ93
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78693494b0b98f0c57574253dfb4fd60_JaffaCakes118
Files
-
78693494b0b98f0c57574253dfb4fd60_JaffaCakes118.dll windows:5 windows x86 arch:x86
4276febc803024f1a146070b33a4a4a5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
KeSetEvent
FsRtlIsNameInExpression
RtlDeleteRegistryValue
KeEnterCriticalRegion
RtlFindUnicodePrefix
IoRegisterDeviceInterface
RtlUpcaseUnicodeToOemN
CcUnpinDataForThread
RtlRandom
CcZeroData
PoSetPowerState
KeQueryTimeIncrement
KeStackAttachProcess
SeDeleteObjectAuditAlarm
IoInvalidateDeviceState
MmBuildMdlForNonPagedPool
IoCheckShareAccess
KeRemoveByKeyDeviceQueue
KeSetTimer
ExGetSharedWaiterCount
KeSetPriorityThread
ZwQueryValueKey
RtlSetAllBits
RtlWriteRegistryValue
ExDeleteNPagedLookasideList
RtlHashUnicodeString
ZwOpenSymbolicLinkObject
ExIsProcessorFeaturePresent
RtlPrefixUnicodeString
MmPageEntireDriver
KeDelayExecutionThread
RtlTimeToTimeFields
ZwOpenProcess
IoDetachDevice
IoCreateDevice
PoRequestPowerIrp
RtlFillMemoryUlong
MmUnlockPagableImageSection
KeRemoveDeviceQueue
RtlInitAnsiString
KeSetTargetProcessorDpc
RtlEqualString
IoSetThreadHardErrorMode
KeInitializeSpinLock
ZwCreateDirectoryObject
PsIsThreadTerminating
KeRegisterBugCheckCallback
RtlFindClearBits
RtlFindLongestRunClear
MmLockPagableDataSection
SeCreateClientSecurity
IoInitializeIrp
KeInitializeTimerEx
IoGetStackLimits
RtlAppendStringToString
SeTokenIsRestricted
IoReportResourceForDetection
RtlMapGenericMask
RtlUpperChar
IoFreeController
ZwEnumerateKey
RtlGetNextRange
RtlEnumerateGenericTable
IoGetDeviceObjectPointer
MmQuerySystemSize
MmFreePagesFromMdl
FsRtlSplitLargeMcb
RtlEqualSid
IoSetSystemPartition
IoAllocateController
RtlUpperString
RtlCompareUnicodeString
RtlGetVersion
KeFlushQueuedDpcs
ExFreePoolWithTag
RtlAnsiCharToUnicodeChar
KeQueryActiveProcessors
PsDereferencePrimaryToken
KeInsertQueue
MmFreeContiguousMemory
RtlNtStatusToDosError
FsRtlIsDbcsInExpression
KeLeaveCriticalRegion
KeSaveFloatingPointState
ZwQueryVolumeInformationFile
RtlUpcaseUnicodeString
IoGetDeviceProperty
ExLocalTimeToSystemTime
IoStartPacket
RtlInitString
RtlInsertUnicodePrefix
MmSetAddressRangeModified
SeDeassignSecurity
RtlAppendUnicodeToString
RtlCheckRegistryKey
ExNotifyCallback
ZwDeviceIoControlFile
ZwOpenKey
ExGetExclusiveWaiterCount
IoGetRelatedDeviceObject
KeRemoveQueue
FsRtlAllocateFileLock
IoDeleteSymbolicLink
IoIsSystemThread
KeQueryInterruptTime
IoGetDeviceInterfaces
RtlCompareMemory
IoStartNextPacket
KeSetImportanceDpc
RtlInitializeBitMap
ZwFsControlFile
FsRtlIsHpfsDbcsLegal
KeWaitForMultipleObjects
KeWaitForSingleObject
IoUpdateShareAccess
MmUnsecureVirtualMemory
PsCreateSystemThread
RtlUpcaseUnicodeChar
ZwOpenFile
ExRaiseStatus
KeInitializeSemaphore
KeInitializeQueue
PoUnregisterSystemState
CcFastMdlReadWait
ZwReadFile
IoRaiseHardError
KeInsertDeviceQueue
RtlCompareString
CcPreparePinWrite
IoDeviceObjectType
MmResetDriverPaging
KeInsertQueueDpc
IoConnectInterrupt
KdDisableDebugger
KeReadStateEvent
RtlEqualUnicodeString
RtlCreateSecurityDescriptor
MmHighestUserAddress
RtlLengthRequiredSid
IoReportDetectedDevice
IoWMIRegistrationControl
ExDeleteResourceLite
RtlTimeToSecondsSince1980
KdEnableDebugger
RtlAreBitsClear
KeInitializeTimer
KeReadStateSemaphore
PsGetCurrentThreadId
ObReferenceObjectByPointer
RtlFindLeastSignificantBit
KePulseEvent
KeBugCheck
ExUuidCreate
IoInvalidateDeviceRelations
ExInitializeResourceLite
IoGetDmaAdapter
ZwCreateKey
IoSetShareAccess
IoRequestDeviceEject
ExFreePool
RtlAreBitsSet
RtlOemStringToUnicodeString
IoGetDriverObjectExtension
KeReleaseSemaphore
IoGetDeviceToVerify
IoMakeAssociatedIrp
RtlCharToInteger
IoReleaseCancelSpinLock
SeAccessCheck
IoGetCurrentProcess
RtlInitUnicodeString
RtlSetDaclSecurityDescriptor
KeSynchronizeExecution
IoOpenDeviceRegistryKey
RtlInt64ToUnicodeString
SeValidSecurityDescriptor
SeOpenObjectAuditAlarm
MmGetSystemRoutineAddress
ZwCreateFile
IoGetBootDiskInformation
ExSystemTimeToLocalTime
RtlDowncaseUnicodeString
IoRemoveShareAccess
RtlNumberOfClearBits
RtlSetBits
IoWriteErrorLogEntry
RtlUnicodeStringToInteger
KeInsertHeadQueue
IoBuildPartialMdl
KeCancelTimer
RtlMultiByteToUnicodeN
FsRtlFreeFileLock
CcRemapBcb
RtlCopyLuid
ExSetTimerResolution
SeQueryInformationToken
IoStopTimer
RtlCopySid
SeAssignSecurity
ExRaiseDatatypeMisalignment
PsLookupProcessByProcessId
RtlCopyString
IoAllocateWorkItem
RtlFindClearRuns
KeReadStateMutex
IoDisconnectInterrupt
MmUnmapLockedPages
FsRtlDeregisterUncProvider
PsGetVersion
ObGetObjectSecurity
FsRtlFastCheckLockForRead
RtlInitializeGenericTable
PsGetCurrentProcess
MmLockPagableSectionByHandle
FsRtlLookupLastLargeMcbEntry
IoGetAttachedDevice
ZwQuerySymbolicLinkObject
SeSinglePrivilegeCheck
MmForceSectionClosed
CcDeferWrite
KeBugCheckEx
SeCaptureSubjectContext
IoAllocateErrorLogEntry
IoInitializeTimer
MmMapLockedPagesSpecifyCache
MmAllocateNonCachedMemory
ExRegisterCallback
MmUnmapIoSpace
IoFreeWorkItem
IoCancelIrp
FsRtlIsFatDbcsLegal
ObQueryNameString
ZwFreeVirtualMemory
RtlFindClearBitsAndSet
CcCopyWrite
RtlCreateUnicodeString
RtlQueryRegistryValues
ZwQueryKey
MmSizeOfMdl
KeUnstackDetachProcess
ZwOpenSection
ZwQueryObject
PsGetCurrentProcessId
KeRestoreFloatingPointState
RtlCopyUnicodeString
KeInitializeDpc
KeRemoveEntryDeviceQueue
ExSetResourceOwnerPointer
KeSetBasePriorityThread
PoSetSystemState
KeGetCurrentThread
RtlClearBits
ExAcquireFastMutexUnsafe
ZwMapViewOfSection
FsRtlFastUnlockSingle
RtlSecondsSince1980ToTime
Exports
Exports
?GetSizeA%%DFKPAKH_NM~U
?CloseListA%%DFIJPAMHPAJ~U
?OnMessageExW%%DFHH_N~U
?WindowInfoOriginal%%DFXHMPAK~U
?SendFullNameNew%%DFGPAF~U
?IsValidFilePath%%DFMIMJPAD~U
?IncrementEvent%%DFMMPAG~U
?KillOptionOld%%DF_NPAJ~U
?FreePointA%%DFIJPAE~U
?HideSizeA%%DFIMPAJ~U
?RtlSectionEx%%DFGKHE~U
?LoadObjectExA%%DFNDK~U
?GlobalDialogOriginal%%DFHN~U
?SetEventW%%DFMHHPAE~U
?GetCharExA%%DFIH~U
?DeleteScreenOld%%DFKF~U
?KillFullNameNew%%DFPAGPAFEGPAE~U
?ShowAnchorNew%%DFIPAEPAKE~U
?SendListOriginal%%DFXJ~U
?ModifyClassExA%%DFFPAJMH~U
?GenerateSizeExW%%DFIPAMI~U
?InstallPointExW%%DFHKF~U
?FindProvider%%DFXH~U
?FormatFolderW%%DFPAXMFID~U
?ValidateWindowEx%%DFII~U
?CloseWindowInfoNew%%DFEPAN~U
?KillDirectoryExA%%DFFHPADG~U
?AddKeyNameExW%%DFGKPAE~U
?SendCharOriginal%%DFPA_NPAGPAGFF~U
?CrtFileNew%%DFXN~U
?InstallEvent%%DFHPAMJFPAG~U
?SendAppNameEx%%DFNPAE~U
?ValidateThreadExA%%DFMPAIPA_NPAD~U
?CrtHeaderExA%%DFXF~U
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.const Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.point Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ