I:\rzfyuhDcg\ppWtypckdJx\ukLhgbgnzPpp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
b9cf624658c319e38436ec6992eaf0e2_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b9cf624658c319e38436ec6992eaf0e2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b9cf624658c319e38436ec6992eaf0e2_JaffaCakes118
-
Size
331KB
-
MD5
b9cf624658c319e38436ec6992eaf0e2
-
SHA1
6c326b24a8cd2649de1b0b2044b7ec0e9ea0c901
-
SHA256
04fd661e1ccc1b22a918e2a16a1ddf3bad2e718ee6bba1aa8e33a3f4a5bb2da5
-
SHA512
de100abc3922ff9cdef762abe46a495131e3604f98f8d05a8af4c93d7bea4ebd31316a231e30b1ca3fef13b58ae429655a59bce6a69959bc379d24aed9d51d5e
-
SSDEEP
6144:vzbaOnJOsO5la/n/jtglEoa4vHg+u83lyn1q+/jst8KHfjIckkQYdWihh19:vz3Ga6lZa4fg+e1q+/4ttHfjIc7Qk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b9cf624658c319e38436ec6992eaf0e2_JaffaCakes118
Files
-
b9cf624658c319e38436ec6992eaf0e2_JaffaCakes118.dll windows:5 windows x86 arch:x86
beacbc265a5816ecedef653879b75a38
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
RtlCompareMemory
KeInsertDeviceQueue
IoCreateNotificationEvent
PsLookupProcessByProcessId
CcCopyWrite
RtlSecondsSince1980ToTime
RtlInitializeSid
PsCreateSystemThread
RtlStringFromGUID
MmAllocateContiguousMemory
ObReferenceObjectByHandle
RtlValidSid
IoGetStackLimits
IoDisconnectInterrupt
KeReadStateSemaphore
PsGetProcessId
RtlFindClearBits
IoSetShareAccess
RtlDeleteElementGenericTable
RtlRandom
KeAttachProcess
CcPinMappedData
IoAllocateWorkItem
ZwFsControlFile
IoCreateDevice
RtlAddAccessAllowedAceEx
IoIsWdmVersionAvailable
IoQueueWorkItem
CcDeferWrite
FsRtlNotifyInitializeSync
HalExamineMBR
ZwClose
ZwQueryKey
MmAdvanceMdl
MmIsDriverVerifying
KeCancelTimer
KeRegisterBugCheckCallback
RtlWriteRegistryValue
ZwOpenProcess
ZwDeleteKey
RtlCopyUnicodeString
KefAcquireSpinLockAtDpcLevel
ExRaiseAccessViolation
PsChargeProcessPoolQuota
MmAllocateNonCachedMemory
RtlDelete
PsImpersonateClient
ZwDeleteValueKey
ZwOpenSection
RtlDeleteRegistryValue
IoQueryFileInformation
KeBugCheckEx
RtlInitUnicodeString
PoCallDriver
KeFlushQueuedDpcs
RtlEqualString
IoRemoveShareAccess
RtlFindUnicodePrefix
IoRegisterDeviceInterface
IoFreeErrorLogEntry
ZwQuerySymbolicLinkObject
RtlInitializeUnicodePrefix
RtlInitAnsiString
MmFlushImageSection
ZwUnloadDriver
RtlDeleteNoSplay
FsRtlIsDbcsInExpression
ZwWriteFile
IoRegisterFileSystem
ExReinitializeResourceLite
IoSetDeviceInterfaceState
IoReadPartitionTable
KeStackAttachProcess
SeReleaseSubjectContext
RtlSetDaclSecurityDescriptor
KeUnstackDetachProcess
SeAccessCheck
RtlFindMostSignificantBit
ExSetResourceOwnerPointer
RtlEnumerateGenericTable
RtlCreateSecurityDescriptor
ExUnregisterCallback
KdEnableDebugger
KeReadStateMutex
RtlCopySid
FsRtlSplitLargeMcb
RtlNumberOfClearBits
MmUnsecureVirtualMemory
ExRaiseDatatypeMisalignment
IoWMIWriteEvent
IoUnregisterFileSystem
IoBuildPartialMdl
IoDeleteDevice
IoReleaseCancelSpinLock
KeEnterCriticalRegion
KeSetSystemAffinityThread
CcRepinBcb
ExDeletePagedLookasideList
KeInsertQueueDpc
FsRtlIsFatDbcsLegal
IoRaiseHardError
ZwCreateSection
IoGetBootDiskInformation
RtlUnicodeToOemN
RtlCharToInteger
ZwCreateFile
RtlSubAuthoritySid
RtlAppendStringToString
KeInitializeTimer
IoGetRequestorProcess
PsGetProcessExitTime
MmUnmapIoSpace
ObOpenObjectByPointer
ObfDereferenceObject
RtlxUnicodeStringToAnsiSize
IoVolumeDeviceToDosName
KeReadStateEvent
ExAcquireFastMutexUnsafe
KeRemoveQueue
MmProbeAndLockPages
IoReportResourceForDetection
IoVerifyVolume
RtlTimeToSecondsSince1970
IoBuildSynchronousFsdRequest
IoGetDeviceInterfaces
CcSetDirtyPinnedData
MmCanFileBeTruncated
CcFastMdlReadWait
IoStartTimer
RtlAreBitsClear
IoAcquireVpbSpinLock
ZwMakeTemporaryObject
IoReleaseRemoveLockEx
ExInitializeResourceLite
RtlCreateUnicodeString
RtlCheckRegistryKey
FsRtlLookupLastLargeMcbEntry
IoSetTopLevelIrp
RtlAddAccessAllowedAce
MmHighestUserAddress
IoCheckShareAccess
CcUnpinData
ZwEnumerateValueKey
RtlDowncaseUnicodeString
IoReportDetectedDevice
ObReleaseObjectSecurity
KeSetTimer
DbgPrompt
FsRtlCheckLockForReadAccess
FsRtlIsHpfsDbcsLegal
IoGetDmaAdapter
KeSetKernelStackSwapEnable
IoFreeController
IoSetDeviceToVerify
RtlLengthSecurityDescriptor
IoGetAttachedDeviceReference
IoCheckQuotaBufferValidity
IoSetPartitionInformationEx
RtlVerifyVersionInfo
IoCreateSymbolicLink
MmLockPagableSectionByHandle
CcFlushCache
ExVerifySuite
ExReleaseResourceLite
IofCompleteRequest
RtlVolumeDeviceToDosName
RtlInitializeBitMap
RtlSplay
KeSetImportanceDpc
ExGetExclusiveWaiterCount
CcFastCopyRead
KeGetCurrentThread
RtlIntegerToUnicodeString
IoReuseIrp
RtlHashUnicodeString
ZwFlushKey
ExAllocatePoolWithQuotaTag
IoGetTopLevelIrp
ProbeForWrite
CcMdlWriteComplete
SeOpenObjectAuditAlarm
SeDeleteObjectAuditAlarm
PsGetCurrentThread
ZwQueryValueKey
MmSizeOfMdl
RtlEqualSid
IoGetRequestorProcessId
RtlMultiByteToUnicodeN
MmUnmapLockedPages
FsRtlMdlWriteCompleteDev
RtlFindClearRuns
ZwSetVolumeInformationFile
KeResetEvent
DbgBreakPoint
RtlInsertUnicodePrefix
CcUnpinRepinnedBcb
KeSaveFloatingPointState
MmUnlockPagableImageSection
PoRegisterSystemState
IoAllocateController
IoGetDriverObjectExtension
ZwNotifyChangeKey
MmUnlockPages
IoGetDeviceObjectPointer
IoVerifyPartitionTable
ZwEnumerateKey
MmIsThisAnNtAsSystem
MmIsVerifierEnabled
IoWMIRegistrationControl
RtlFindSetBits
CcSetFileSizes
PoSetSystemState
RtlUnicodeStringToInteger
ObMakeTemporaryObject
PsGetVersion
SePrivilegeCheck
RtlAppendUnicodeToString
CcRemapBcb
KeInitializeDeviceQueue
ExGetSharedWaiterCount
KeRestoreFloatingPointState
MmFreeContiguousMemory
FsRtlFastUnlockSingle
PsLookupThreadByThreadId
ExLocalTimeToSystemTime
ZwQueryVolumeInformationFile
IoStartPacket
MmGetPhysicalAddress
WmiQueryTraceInformation
RtlInitString
SeValidSecurityDescriptor
IoWritePartitionTableEx
RtlSecondsSince1970ToTime
ObQueryNameString
ZwAllocateVirtualMemory
ExReleaseFastMutexUnsafe
ZwMapViewOfSection
ExCreateCallback
MmForceSectionClosed
RtlCopyLuid
IoInvalidateDeviceRelations
PoSetPowerState
CcInitializeCacheMap
PoStartNextPowerIrp
IoGetDeviceToVerify
ZwCreateEvent
SeUnlockSubjectContext
RtlTimeToTimeFields
CcPinRead
ObGetObjectSecurity
IoAcquireRemoveLockEx
SeTokenIsRestricted
ExSystemTimeToLocalTime
IoAllocateAdapterChannel
ZwDeviceIoControlFile
IoInitializeIrp
ZwOpenSymbolicLinkObject
CcSetBcbOwnerPointer
FsRtlFastCheckLockForRead
KeInitializeMutex
KeInitializeTimerEx
IoGetLowerDeviceObject
Exports
Exports
?GlobalWindowA@@YGHF&U
?IncrementThreadExW@@YGPAEPAKIPAKJ&U
?PutEventOld@@YGFM&U
?KillOptionExW@@YGPAMPAGPAKKPAK&U
?FreeListExW@@YGDPAH&U
?CancelScreenExW@@YGPAIPA_NI&U
?GenerateWidthExA@@YGJKEIPAM&U
?FindCommandLine@@YGFJK&U
?CallAppNameExW@@YGEH&U
?ClosePointExA@@YGXPAFPAKD&U
?PutTimeOld@@YGXPAMHIK&U
?CloseTask@@YGGGPAIKF&U
?LoadDeviceEx@@YGMK&U
?CloseMemoryEx@@YGJPA_NPAFMPAH&U
?CallTimerOld@@YGJPAIPAI&U
?CallPathEx@@YGDJKMN&U
?DecrementWindowInfoW@@YGIF_N&U
?IncrementListItemNew@@YGPAMPAM&U
?InstallScreenEx@@YGDD&U
?HideDirectoryExA@@YGXPAK&U
?LoadListNew@@YGXPAD&U
?IsDeviceOriginal@@YGJK&U
?CopyAnchorA@@YGXDHPAI&U
?InstallMonitorA@@YGIPAJMPAEM&U
?PutProcessNew@@YGEJJ&U
?GlobalDialogExW@@YGEH&U
?CallDateExW@@YGPAEDIN&U
?ShowExpression@@YG_NPAFDFPAD&U
?RtlWindow@@YGPANI&U
?FreeKeyNameOld@@YGDPAJPADM&U
?SetDateOld@@YGPAEPAFGH&U
?CancelDeviceOld@@YGKPAMNPAMPAF&U
?CallHeaderNew@@YGFPAE&U
Sections
.text Size: 29KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.i_data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.e_data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hostc Size: 512B - Virtual size: 28B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hosta Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hostb Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hostd Size: 512B - Virtual size: 478B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ