vga.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a54a30e3c3a84e5c0316616a9be1cd83_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a54a30e3c3a84e5c0316616a9be1cd83_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a54a30e3c3a84e5c0316616a9be1cd83_JaffaCakes118
-
Size
9KB
-
MD5
a54a30e3c3a84e5c0316616a9be1cd83
-
SHA1
414eac148c39af0e03eb670442a308f5bf9cd4a7
-
SHA256
ac945134922a5cf21faa8c4da58b41fd2ff6a4899db256593f1279ea93166cbe
-
SHA512
600a72f7ff106cfe1039f28441a3834ccf8728c9f19e4fce17d0f6fed449811862a7820036fcbb690c88f52ca5aaaa80131598ce371131916a01e3c359b12d89
-
SSDEEP
192:yIYWsa81tX4j3ATDk3BMr6yedjDRp4qeaWifBWmMM:n9saqtX4jYDk3BMr6pdvRp4qvWifBWmX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a54a30e3c3a84e5c0316616a9be1cd83_JaffaCakes118
Files
-
a54a30e3c3a84e5c0316616a9be1cd83_JaffaCakes118.dll windows:5 windows x86 arch:x86
b96ef66bd3a923d4124daabc09f4bdbf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
win32k.sys
PATHOBJ_vGetBounds
EngStrokePath
EngBitBlt
EngTextOut
EngPaint
EngFreeMem
EngAllocMem
EngDeviceIoControl
EngCreatePalette
EngDeletePalette
EngDeleteSurface
EngUnlockSurface
EngLockSurface
EngCreateBitmap
EngAssociateSurface
EngCreateDeviceSurface
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 410B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 256B - Virtual size: 154B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ