p:\vc5\release\null.pdb
Static task
static1
Behavioral task
behavioral1
Sample
95afc6be99010e2bdd5a6dc639dbe132_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
95afc6be99010e2bdd5a6dc639dbe132_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
95afc6be99010e2bdd5a6dc639dbe132_JaffaCakes118
-
Size
26KB
-
MD5
95afc6be99010e2bdd5a6dc639dbe132
-
SHA1
b6c8f5d4346cbf8a673719fbfbce21ce1c79147a
-
SHA256
2e731796f57136a8ea41b04a4603dab8a45983f8690b5da07ab695e807006ac1
-
SHA512
ba6aaf370ed5b4b924585c7202f1536aa23d57bfa8a8fb19bbfd42bc1a284bed9f7a3fcae2dbb0dbb27b5a676d2b69e2206fc4e0311d05bb544b88476e8335cd
-
SSDEEP
768:bTRO9ZicEojES0KBQWK+CbcxFBoMjPxSG8Q2:blO9tzl0Eo9E3oMjDC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95afc6be99010e2bdd5a6dc639dbe132_JaffaCakes118
Files
-
95afc6be99010e2bdd5a6dc639dbe132_JaffaCakes118.dll windows:5 windows x86 arch:x86
983ebf5df793d7a20b6ddcd1c3ef4e5c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
ObfDereferenceObject
ExAllocatePool
ExFreePoolWithTag
ZwClose
ZwOpenFile
ZwQueryInformationFile
ZwCreateSection
ZwMapViewOfSection
ZwUnmapViewOfSection
ZwDeleteFile
swprintf
RtlInitUnicodeString
ZwOpenKey
ZwQueryKey
RtlStringFromGUID
RtlFreeUnicodeString
ZwQueryValueKey
ZwSetValueKey
ZwCreateKey
PsGetVersion
sprintf
strchr
IoFreeWorkItem
IoAllocateWorkItem
IoQueueWorkItem
KeCancelTimer
KeFlushQueuedDpcs
IoDeleteDevice
IofCompleteRequest
IoCreateDevice
ObMakeTemporaryObject
KeInitializeTimer
KeInitializeDpc
KeSetTimerEx
KeInsertQueue
KeQuerySystemTime
KeRemoveQueue
KeRundownQueue
IoFreeIrp
KeInitializeQueue
ObfReferenceObject
PsCreateSystemThread
ZwCreateFile
ObReferenceObjectByHandle
IoBuildDeviceIoControlRequest
IofCallDriver
KeSetTimer
ExQueueWorkItem
RtlIpv4StringToAddressW
ZwEnumerateKey
RtlIpv4AddressToStringA
ZwQueryVolumeInformationFile
ZwReadFile
ZwWriteFile
ZwSetInformationFile
ZwOpenEvent
ZwQuerySystemInformation
ZwOpenProcess
ZwOpenProcessToken
ZwQueryInformationToken
RtlEqualSid
ZwQueryInformationProcess
DbgPrint
memcpy
memset
_alldiv
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ