T:\cDibWlhxN\wavvyjlxh\GLmdnEigqWvn\aAKTlgnaNhx\eocdqawrEwQioO.pdb
Static task
static1
Behavioral task
behavioral1
Sample
be873b0eb6f6a9b321e310f92964f69c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be873b0eb6f6a9b321e310f92964f69c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
be873b0eb6f6a9b321e310f92964f69c_JaffaCakes118
-
Size
36KB
-
MD5
be873b0eb6f6a9b321e310f92964f69c
-
SHA1
c1248ac1992dd4b5317f8d9a880f83b37c385d12
-
SHA256
016b35bb3521e904df2ab999930fb48b56e23f0d22f1df05cf6d1960f65a01fb
-
SHA512
a2fcf90df840f14bdf59db34da193442c5a45a2102a9b2cdf4d3884314d32ef7b6c3de8459db6dc8693ae87c8f0f0432ff90218593c9e39846ea59c712443953
-
SSDEEP
768:Xw/ckKCKLbBtwnindqEel5dIJ2z1u46/yNNQ5uOWc52ka:XIckEBtwi80+6R1x
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource be873b0eb6f6a9b321e310f92964f69c_JaffaCakes118
Files
-
be873b0eb6f6a9b321e310f92964f69c_JaffaCakes118.dll windows:5 windows x86 arch:x86
d439b6eb680f9340f2cee878ad7f1a53
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
KeQuerySystemTime
IoCheckQuotaBufferValidity
FsRtlSplitLargeMcb
IoCreateFile
PsGetCurrentProcessId
IoDetachDevice
RtlFillMemoryUlong
RtlInitString
IoFreeController
ZwCreateSection
RtlInsertUnicodePrefix
IoSetDeviceInterfaceState
PoRegisterSystemState
RtlCompareUnicodeString
IoGetAttachedDeviceReference
IoInitializeIrp
IoGetDeviceObjectPointer
RtlFindUnicodePrefix
MmUnmapLockedPages
RtlTimeToSecondsSince1970
ObCreateObject
SeDeassignSecurity
IoConnectInterrupt
ProbeForRead
ZwFreeVirtualMemory
RtlDeleteRegistryValue
RtlLengthSecurityDescriptor
DbgBreakPointWithStatus
ZwOpenFile
ObReferenceObjectByPointer
KeResetEvent
IoSetShareAccess
KeEnterCriticalRegion
ExReinitializeResourceLite
KeInsertDeviceQueue
MmHighestUserAddress
MmQuerySystemSize
KeInitializeApc
KeInsertByKeyDeviceQueue
MmLockPagableSectionByHandle
CcDeferWrite
IoGetAttachedDevice
KeRemoveDeviceQueue
PoUnregisterSystemState
PsGetCurrentThreadId
ZwDeleteValueKey
ZwDeleteKey
IoInitializeTimer
ExAllocatePoolWithQuotaTag
IoAllocateIrp
ZwQueryInformationFile
RtlUnicodeStringToAnsiString
RtlUpcaseUnicodeChar
MmGetSystemRoutineAddress
IoBuildSynchronousFsdRequest
SeQueryInformationToken
MmFreeMappingAddress
ExAcquireFastMutexUnsafe
ZwQueryKey
RtlUpperString
FsRtlFastUnlockSingle
IoDeleteDevice
ExReleaseResourceLite
MmFreePagesFromMdl
KeGetCurrentThread
RtlFreeAnsiString
RtlMapGenericMask
IoStartPacket
KeReadStateSemaphore
RtlCopyString
IoAllocateWorkItem
MmCanFileBeTruncated
RtlInt64ToUnicodeString
IoRegisterDeviceInterface
RtlAreBitsClear
IoGetDmaAdapter
MmIsAddressValid
ZwEnumerateKey
KeRemoveByKeyDeviceQueue
KeInitializeTimer
PsDereferencePrimaryToken
KeStackAttachProcess
MmAllocateMappingAddress
RtlSecondsSince1980ToTime
IoInvalidateDeviceState
KeDeregisterBugCheckCallback
RtlFindLongestRunClear
FsRtlIsNameInExpression
KeQueryTimeIncrement
KeCancelTimer
ExFreePool
IoGetDriverObjectExtension
ObReleaseObjectSecurity
KeSynchronizeExecution
RtlNtStatusToDosError
IoBuildPartialMdl
KeRestoreFloatingPointState
RtlFindClearRuns
RtlStringFromGUID
ExFreePoolWithTag
RtlAreBitsSet
RtlClearBits
IoAllocateMdl
RtlOemStringToUnicodeString
KeSetKernelStackSwapEnable
IoOpenDeviceRegistryKey
ExReleaseFastMutexUnsafe
ExAllocatePoolWithTag
RtlCreateUnicodeString
FsRtlCheckOplock
KeFlushQueuedDpcs
ZwClose
KeReleaseMutex
ZwQueryValueKey
KeLeaveCriticalRegion
IoGetDeviceInterfaces
SeTokenIsRestricted
RtlCreateSecurityDescriptor
IoRemoveShareAccess
RtlUnicodeToMultiByteN
MmIsDriverVerifying
RtlAppendStringToString
SeImpersonateClientEx
IoIsSystemThread
MmFreeContiguousMemory
IoGetRequestorProcessId
IoSetThreadHardErrorMode
ExSetTimerResolution
RtlNumberOfClearBits
IoFreeMdl
PoRequestPowerIrp
RtlClearAllBits
MmGetPhysicalAddress
RtlxAnsiStringToUnicodeSize
ZwQuerySymbolicLinkObject
IoAcquireCancelSpinLock
KeInitializeSemaphore
KeInitializeDeviceQueue
ZwCreateFile
ZwOpenSection
RtlLengthRequiredSid
PsLookupProcessByProcessId
IoGetStackLimits
RtlFindNextForwardRunClear
SeAccessCheck
IoGetDeviceProperty
IoDeleteController
KeInsertHeadQueue
RtlFindClearBits
RtlAddAccessAllowedAceEx
ExAcquireResourceSharedLite
IoStartTimer
ZwQueryObject
IoCreateStreamFileObjectLite
RtlEqualUnicodeString
MmBuildMdlForNonPagedPool
MmResetDriverPaging
MmLockPagableDataSection
KeReadStateMutex
KeInitializeMutex
IoReuseIrp
RtlValidSecurityDescriptor
IoCreateDevice
KeRemoveQueue
PoStartNextPowerIrp
KeUnstackDetachProcess
RtlAppendUnicodeToString
RtlTimeToSecondsSince1980
IoReportResourceForDetection
ExUuidCreate
ZwCreateDirectoryObject
MmFreeNonCachedMemory
KdDisableDebugger
RtlUnicodeToOemN
MmUnlockPagableImageSection
PoSetPowerState
ExDeleteNPagedLookasideList
RtlSubAuthoritySid
CcCopyRead
FsRtlNotifyInitializeSync
KePulseEvent
RtlSetDaclSecurityDescriptor
IoWMIRegistrationControl
PsIsThreadTerminating
ExSetResourceOwnerPointer
ExGetExclusiveWaiterCount
SeOpenObjectAuditAlarm
RtlHashUnicodeString
IoGetDeviceInterfaceAlias
IoReleaseCancelSpinLock
CcIsThereDirtyData
IoCreateNotificationEvent
RtlUpcaseUnicodeString
MmSecureVirtualMemory
IoSetHardErrorOrVerifyDevice
FsRtlDeregisterUncProvider
ZwReadFile
ExSystemTimeToLocalTime
KeBugCheck
FsRtlFastCheckLockForRead
RtlInitializeBitMap
RtlValidSid
RtlTimeFieldsToTime
MmMapLockedPagesSpecifyCache
IoFreeWorkItem
KeSetEvent
ExGetPreviousMode
IoDeleteSymbolicLink
ZwMakeTemporaryObject
IoUpdateShareAccess
KeReadStateTimer
PsCreateSystemThread
KeQueryActiveProcessors
SeCaptureSubjectContext
CcRemapBcb
ZwFsControlFile
KeInsertQueueDpc
FsRtlIsFatDbcsLegal
PsGetCurrentThread
RtlSecondsSince1970ToTime
IoAttachDeviceToDeviceStack
SeDeleteObjectAuditAlarm
IoQueueWorkItem
IoGetRelatedDeviceObject
SeValidSecurityDescriptor
PsGetCurrentProcess
MmPageEntireDriver
IoCreateSynchronizationEvent
SeCreateClientSecurity
RtlFindLastBackwardRunClear
RtlInitAnsiString
KeRemoveQueueDpc
ObGetObjectSecurity
KeSetImportanceDpc
KeInsertQueue
KeClearEvent
KeSaveFloatingPointState
ExLocalTimeToSystemTime
RtlInitializeUnicodePrefix
RtlGetVersion
FsRtlGetNextFileLock
KeRemoveEntryDeviceQueue
CcZeroData
MmForceSectionClosed
IoCreateSymbolicLink
RtlCopySid
IoCheckEaBufferValidity
ZwEnumerateValueKey
PsGetVersion
RtlDeleteNoSplay
ExRaiseAccessViolation
MmMapIoSpace
ObReferenceObjectByHandle
KeQueryInterruptTime
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.const Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.point Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 496B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ