Q:\mPatnjsc\ExrYCDfvqcumZJ\eyaOBhljpmoz\rLkoMbOF\rnwshgnvQghA.pdb
Static task
static1
Behavioral task
behavioral1
Sample
8e2a4bc66cb0791a5c551a8af7cdd886_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e2a4bc66cb0791a5c551a8af7cdd886_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8e2a4bc66cb0791a5c551a8af7cdd886_JaffaCakes118
-
Size
159KB
-
MD5
8e2a4bc66cb0791a5c551a8af7cdd886
-
SHA1
d836e79be1635bc122ded8962a05853f981a03a6
-
SHA256
e8cb249ddbccc47e15dce73d332240926e1ef7b05a92185c3f93bf99e71669ce
-
SHA512
82130125d677e57add4d5627769ec746cad8130bf5eeb34c76fc61862eebdd6f8e09a47d3a105bc4953cc7a42e94d2fd8a77f7a1a5b2a7ea5b7ac58ed64ff275
-
SSDEEP
3072:4H5MSXy5NobV6c2FfL26HQnZ3gXk23s5Pa+jB3fwLEx:CuOpL2FfL3yJaU3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e2a4bc66cb0791a5c551a8af7cdd886_JaffaCakes118
Files
-
8e2a4bc66cb0791a5c551a8af7cdd886_JaffaCakes118.dll windows:5 windows x86 arch:x86
740a408a297ec7e2e17eb6322ea337f7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
KeStackAttachProcess
MmLockPagableSectionByHandle
RtlFreeAnsiString
KeQueryActiveProcessors
ZwOpenSymbolicLinkObject
IoGetDeviceToVerify
IoQueueWorkItem
ZwEnumerateKey
IoStartTimer
RtlVerifyVersionInfo
IoFreeIrp
KeSetEvent
CcCopyRead
RtlFindNextForwardRunClear
PoRequestPowerIrp
KeSetTargetProcessorDpc
IoSetShareAccess
RtlHashUnicodeString
FsRtlAllocateFileLock
RtlEqualSid
ExAllocatePoolWithTag
IoCancelIrp
IoConnectInterrupt
RtlTimeToSecondsSince1970
SeTokenIsAdmin
KeReadStateEvent
MmHighestUserAddress
RtlNumberOfClearBits
SeTokenIsRestricted
IoFreeMdl
IoInvalidateDeviceState
IoDisconnectInterrupt
IoCreateSynchronizationEvent
RtlSecondsSince1970ToTime
RtlMultiByteToUnicodeN
KeWaitForSingleObject
ExNotifyCallback
RtlUnicodeToOemN
ZwCreateFile
FsRtlFastUnlockSingle
ZwCreateKey
RtlCompareMemory
FsRtlSplitLargeMcb
RtlDowncaseUnicodeString
IoOpenDeviceRegistryKey
MmAdvanceMdl
KeSetBasePriorityThread
RtlCopyLuid
IoSetHardErrorOrVerifyDevice
ZwQueryObject
KeUnstackDetachProcess
IoAllocateErrorLogEntry
PsGetCurrentProcess
RtlInitializeUnicodePrefix
KeRundownQueue
KeInsertHeadQueue
IoStartNextPacket
KeSetTimer
RtlSetDaclSecurityDescriptor
PsLookupProcessByProcessId
ProbeForWrite
KeLeaveCriticalRegion
PsCreateSystemThread
IoAllocateIrp
ExFreePool
MmUnlockPages
RtlFindSetBits
ObGetObjectSecurity
KeDeregisterBugCheckCallback
RtlInsertUnicodePrefix
IoRequestDeviceEject
FsRtlFreeFileLock
ZwDeviceIoControlFile
RtlValidSid
RtlInitializeSid
RtlFindClearBits
CcIsThereDirtyData
KeInitializeMutex
RtlUnicodeToMultiByteN
KeSetTimerEx
KeInsertQueueDpc
ObCreateObject
ZwDeleteValueKey
FsRtlLookupLastLargeMcbEntry
ZwDeleteKey
PoStartNextPowerIrp
KeRestoreFloatingPointState
IoInitializeIrp
RtlCopyString
IoBuildSynchronousFsdRequest
FsRtlCheckOplock
RtlFindClearRuns
IoGetDeviceObjectPointer
KeInsertDeviceQueue
RtlInitUnicodeString
ExReleaseResourceLite
ExSetResourceOwnerPointer
ExReinitializeResourceLite
KeInitializeEvent
RtlCompareUnicodeString
RtlUpperChar
IoCreateNotificationEvent
RtlTimeFieldsToTime
IoDeleteDevice
FsRtlFastCheckLockForRead
FsRtlDeregisterUncProvider
MmIsDriverVerifying
ExGetPreviousMode
RtlCreateRegistryKey
KeEnterCriticalRegion
ExRegisterCallback
KeReleaseSemaphore
IoGetStackLimits
KeRemoveByKeyDeviceQueue
KeInitializeTimer
MmFreePagesFromMdl
PsLookupThreadByThreadId
ZwOpenSection
SeDeleteObjectAuditAlarm
ZwAllocateVirtualMemory
IoGetDeviceProperty
IoInitializeTimer
IoIsWdmVersionAvailable
KeBugCheckEx
MmGetSystemRoutineAddress
RtlAnsiStringToUnicodeString
ExAllocatePoolWithQuotaTag
PsTerminateSystemThread
KeReadStateTimer
RtlFindUnicodePrefix
ZwFsControlFile
IoReleaseCancelSpinLock
PsGetCurrentThread
CcZeroData
KeRemoveQueueDpc
RtlOemStringToUnicodeString
IoAllocateController
KeSetKernelStackSwapEnable
KeReleaseMutex
MmFreeContiguousMemory
ExCreateCallback
IoIsSystemThread
ObReferenceObjectByPointer
KeQueryTimeIncrement
KeInitializeDpc
RtlInitAnsiString
ExUnregisterCallback
RtlUnicodeStringToAnsiString
RtlUpcaseUnicodeString
ExAcquireFastMutexUnsafe
KeGetCurrentThread
RtlGUIDFromString
PsGetCurrentThreadId
SeQueryAuthenticationIdToken
RtlEqualString
RtlFindLeastSignificantBit
ProbeForRead
CcFastCopyWrite
RtlFindMostSignificantBit
MmProbeAndLockPages
ExGetSharedWaiterCount
KeInsertByKeyDeviceQueue
FsRtlNotifyInitializeSync
ZwQueryVolumeInformationFile
PoSetSystemState
KeClearEvent
IoWriteErrorLogEntry
KeCancelTimer
IoCheckQuotaBufferValidity
MmUnmapIoSpace
RtlCreateSecurityDescriptor
RtlAddAccessAllowedAceEx
RtlStringFromGUID
RtlDeleteRegistryValue
RtlSetAllBits
RtlUpperString
IoAllocateWorkItem
KeWaitForMultipleObjects
ExLocalTimeToSystemTime
PsGetVersion
IoCreateSymbolicLink
MmResetDriverPaging
KePulseEvent
MmMapIoSpace
FsRtlIsDbcsInExpression
IoGetBootDiskInformation
ExReleaseFastMutexUnsafe
KeInitializeQueue
ExDeleteNPagedLookasideList
RtlCopySid
DbgBreakPointWithStatus
IoSetDeviceInterfaceState
PoSetPowerState
KeSetImportanceDpc
ZwEnumerateValueKey
ZwReadFile
RtlCopyUnicodeString
KeResetEvent
RtlCompareString
SeSinglePrivilegeCheck
RtlEqualUnicodeString
RtlxUnicodeStringToAnsiSize
RtlAreBitsClear
RtlUpcaseUnicodeChar
KeInitializeSpinLock
ZwMakeTemporaryObject
FsRtlGetNextFileLock
FsRtlCheckLockForReadAccess
CcFastMdlReadWait
SeCreateClientSecurity
RtlGetNextRange
RtlInitString
MmSetAddressRangeModified
SeAssignSecurity
ZwCreateSection
ExGetExclusiveWaiterCount
PsSetLoadImageNotifyRoutine
IoAttachDeviceToDeviceStack
MmSizeOfMdl
IoInvalidateDeviceRelations
FsRtlIsTotalDeviceFailure
KeBugCheck
KdDisableDebugger
ExVerifySuite
RtlTimeToSecondsSince1980
IoGetRequestorProcessId
RtlAreBitsSet
IoDetachDevice
RtlGetVersion
RtlTimeToTimeFields
IoFreeWorkItem
RtlClearBits
ExRaiseDatatypeMisalignment
RtlAppendStringToString
RtlDeleteNoSplay
ExSystemTimeToLocalTime
ZwClose
IoStartPacket
CcPreparePinWrite
ExRaiseStatus
IoCheckEaBufferValidity
RtlRandom
IoGetDriverObjectExtension
PoUnregisterSystemState
IoCreateStreamFileObjectLite
IoReportResourceForDetection
KeQuerySystemTime
ExDeleteResourceLite
IoWMIRegistrationControl
IoDeviceObjectType
MmLockPagableDataSection
IoReportDetectedDevice
KdEnableDebugger
KeSetPriorityThread
MmIsVerifierEnabled
RtlLengthSecurityDescriptor
ZwQuerySymbolicLinkObject
MmCanFileBeTruncated
Sections
.text Size: 28KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.i_data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.e_data Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hostc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hosta Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hostb Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hostd Size: 512B - Virtual size: 402B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ