T:\cDibWlhxN\wavvyjlxh\GLmdnEigqWvn\aAKTlgnaNhx\eocdqawrEwQioO.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8dabc0b1db49fe9db14c6504e561ce23_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8dabc0b1db49fe9db14c6504e561ce23_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8dabc0b1db49fe9db14c6504e561ce23_JaffaCakes118
-
Size
36KB
-
MD5
8dabc0b1db49fe9db14c6504e561ce23
-
SHA1
6a915d12302ce3f189a188f7bb6b683bf54eedbd
-
SHA256
f203adb917047a26cc0e964a9c423d7929afa9e9d9626a69f332d8b017d42fd0
-
SHA512
2d710ee5cb6d3834a131a6454e939c75d9ec5162eb18b8c45e22d023934065e646f87a8ee117c1e01df3447705e1442045949969abdd5648de5db450491ca993
-
SSDEEP
768:pw/ckKCKLbBtwnindqEel5dIJ2z1u46/yNNQ5uOWc52ka:pIckEBtwi80+6R1x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8dabc0b1db49fe9db14c6504e561ce23_JaffaCakes118
Files
-
8dabc0b1db49fe9db14c6504e561ce23_JaffaCakes118.dll windows:5 windows x86 arch:x86
d439b6eb680f9340f2cee878ad7f1a53
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
KeQuerySystemTime
IoCheckQuotaBufferValidity
FsRtlSplitLargeMcb
IoCreateFile
PsGetCurrentProcessId
IoDetachDevice
RtlFillMemoryUlong
RtlInitString
IoFreeController
ZwCreateSection
RtlInsertUnicodePrefix
IoSetDeviceInterfaceState
PoRegisterSystemState
RtlCompareUnicodeString
IoGetAttachedDeviceReference
IoInitializeIrp
IoGetDeviceObjectPointer
RtlFindUnicodePrefix
MmUnmapLockedPages
RtlTimeToSecondsSince1970
ObCreateObject
SeDeassignSecurity
IoConnectInterrupt
ProbeForRead
ZwFreeVirtualMemory
RtlDeleteRegistryValue
RtlLengthSecurityDescriptor
DbgBreakPointWithStatus
ZwOpenFile
ObReferenceObjectByPointer
KeResetEvent
IoSetShareAccess
KeEnterCriticalRegion
ExReinitializeResourceLite
KeInsertDeviceQueue
MmHighestUserAddress
MmQuerySystemSize
KeInitializeApc
KeInsertByKeyDeviceQueue
MmLockPagableSectionByHandle
CcDeferWrite
IoGetAttachedDevice
KeRemoveDeviceQueue
PoUnregisterSystemState
PsGetCurrentThreadId
ZwDeleteValueKey
ZwDeleteKey
IoInitializeTimer
ExAllocatePoolWithQuotaTag
IoAllocateIrp
ZwQueryInformationFile
RtlUnicodeStringToAnsiString
RtlUpcaseUnicodeChar
MmGetSystemRoutineAddress
IoBuildSynchronousFsdRequest
SeQueryInformationToken
MmFreeMappingAddress
ExAcquireFastMutexUnsafe
ZwQueryKey
RtlUpperString
FsRtlFastUnlockSingle
IoDeleteDevice
ExReleaseResourceLite
MmFreePagesFromMdl
KeGetCurrentThread
RtlFreeAnsiString
RtlMapGenericMask
IoStartPacket
KeReadStateSemaphore
RtlCopyString
IoAllocateWorkItem
MmCanFileBeTruncated
RtlInt64ToUnicodeString
IoRegisterDeviceInterface
RtlAreBitsClear
IoGetDmaAdapter
MmIsAddressValid
ZwEnumerateKey
KeRemoveByKeyDeviceQueue
KeInitializeTimer
PsDereferencePrimaryToken
KeStackAttachProcess
MmAllocateMappingAddress
RtlSecondsSince1980ToTime
IoInvalidateDeviceState
KeDeregisterBugCheckCallback
RtlFindLongestRunClear
FsRtlIsNameInExpression
KeQueryTimeIncrement
KeCancelTimer
ExFreePool
IoGetDriverObjectExtension
ObReleaseObjectSecurity
KeSynchronizeExecution
RtlNtStatusToDosError
IoBuildPartialMdl
KeRestoreFloatingPointState
RtlFindClearRuns
RtlStringFromGUID
ExFreePoolWithTag
RtlAreBitsSet
RtlClearBits
IoAllocateMdl
RtlOemStringToUnicodeString
KeSetKernelStackSwapEnable
IoOpenDeviceRegistryKey
ExReleaseFastMutexUnsafe
ExAllocatePoolWithTag
RtlCreateUnicodeString
FsRtlCheckOplock
KeFlushQueuedDpcs
ZwClose
KeReleaseMutex
ZwQueryValueKey
KeLeaveCriticalRegion
IoGetDeviceInterfaces
SeTokenIsRestricted
RtlCreateSecurityDescriptor
IoRemoveShareAccess
RtlUnicodeToMultiByteN
MmIsDriverVerifying
RtlAppendStringToString
SeImpersonateClientEx
IoIsSystemThread
MmFreeContiguousMemory
IoGetRequestorProcessId
IoSetThreadHardErrorMode
ExSetTimerResolution
RtlNumberOfClearBits
IoFreeMdl
PoRequestPowerIrp
RtlClearAllBits
MmGetPhysicalAddress
RtlxAnsiStringToUnicodeSize
ZwQuerySymbolicLinkObject
IoAcquireCancelSpinLock
KeInitializeSemaphore
KeInitializeDeviceQueue
ZwCreateFile
ZwOpenSection
RtlLengthRequiredSid
PsLookupProcessByProcessId
IoGetStackLimits
RtlFindNextForwardRunClear
SeAccessCheck
IoGetDeviceProperty
IoDeleteController
KeInsertHeadQueue
RtlFindClearBits
RtlAddAccessAllowedAceEx
ExAcquireResourceSharedLite
IoStartTimer
ZwQueryObject
IoCreateStreamFileObjectLite
RtlEqualUnicodeString
MmBuildMdlForNonPagedPool
MmResetDriverPaging
MmLockPagableDataSection
KeReadStateMutex
KeInitializeMutex
IoReuseIrp
RtlValidSecurityDescriptor
IoCreateDevice
KeRemoveQueue
PoStartNextPowerIrp
KeUnstackDetachProcess
RtlAppendUnicodeToString
RtlTimeToSecondsSince1980
IoReportResourceForDetection
ExUuidCreate
ZwCreateDirectoryObject
MmFreeNonCachedMemory
KdDisableDebugger
RtlUnicodeToOemN
MmUnlockPagableImageSection
PoSetPowerState
ExDeleteNPagedLookasideList
RtlSubAuthoritySid
CcCopyRead
FsRtlNotifyInitializeSync
KePulseEvent
RtlSetDaclSecurityDescriptor
IoWMIRegistrationControl
PsIsThreadTerminating
ExSetResourceOwnerPointer
ExGetExclusiveWaiterCount
SeOpenObjectAuditAlarm
RtlHashUnicodeString
IoGetDeviceInterfaceAlias
IoReleaseCancelSpinLock
CcIsThereDirtyData
IoCreateNotificationEvent
RtlUpcaseUnicodeString
MmSecureVirtualMemory
IoSetHardErrorOrVerifyDevice
FsRtlDeregisterUncProvider
ZwReadFile
ExSystemTimeToLocalTime
KeBugCheck
FsRtlFastCheckLockForRead
RtlInitializeBitMap
RtlValidSid
RtlTimeFieldsToTime
MmMapLockedPagesSpecifyCache
IoFreeWorkItem
KeSetEvent
ExGetPreviousMode
IoDeleteSymbolicLink
ZwMakeTemporaryObject
IoUpdateShareAccess
KeReadStateTimer
PsCreateSystemThread
KeQueryActiveProcessors
SeCaptureSubjectContext
CcRemapBcb
ZwFsControlFile
KeInsertQueueDpc
FsRtlIsFatDbcsLegal
PsGetCurrentThread
RtlSecondsSince1970ToTime
IoAttachDeviceToDeviceStack
SeDeleteObjectAuditAlarm
IoQueueWorkItem
IoGetRelatedDeviceObject
SeValidSecurityDescriptor
PsGetCurrentProcess
MmPageEntireDriver
IoCreateSynchronizationEvent
SeCreateClientSecurity
RtlFindLastBackwardRunClear
RtlInitAnsiString
KeRemoveQueueDpc
ObGetObjectSecurity
KeSetImportanceDpc
KeInsertQueue
KeClearEvent
KeSaveFloatingPointState
ExLocalTimeToSystemTime
RtlInitializeUnicodePrefix
RtlGetVersion
FsRtlGetNextFileLock
KeRemoveEntryDeviceQueue
CcZeroData
MmForceSectionClosed
IoCreateSymbolicLink
RtlCopySid
IoCheckEaBufferValidity
ZwEnumerateValueKey
PsGetVersion
RtlDeleteNoSplay
ExRaiseAccessViolation
MmMapIoSpace
ObReferenceObjectByHandle
KeQueryInterruptTime
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.const Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.point Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 496B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ