C:\projects\src\out\Default\VkICD_mock_icd.dll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
c7d66d592929ed4b21ee6d5b8d9ce70b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7d66d592929ed4b21ee6d5b8d9ce70b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c7d66d592929ed4b21ee6d5b8d9ce70b_JaffaCakes118
-
Size
339KB
-
MD5
c7d66d592929ed4b21ee6d5b8d9ce70b
-
SHA1
2ac1f1cf402d7af4d566f29c80dd8d514a32bc09
-
SHA256
e13bd6f75d9866a9cdad5fd689113639151a12aac9276687d4cbc220183716a6
-
SHA512
e0c5a46a80ce78f742f6547d494b9286de9c86a83a01e29f0e342bfd54ce9df09f20d7dfd91f833a02712cb0572d8f6762e7b8976f591c08b6acff4470ab65bb
-
SSDEEP
6144:brrJevdhxIg9hEJsbx7qNFOXeQ/QtBvjmxTGo8JpIFoh2Zv0M7XPJu8RZMe:HAIs1qNFORiltq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c7d66d592929ed4b21ee6d5b8d9ce70b_JaffaCakes118
Files
-
c7d66d592929ed4b21ee6d5b8d9ce70b_JaffaCakes118.dll windows:5 windows x64 arch:x64
09fbda39d2848bc0fdf4acbf400a2684
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
ChangeTimerQueueTimer
CloseHandle
CreateEventW
CreateFileW
CreateThread
CreateTimerQueue
CreateTimerQueueTimer
DecodePointer
DeleteCriticalSection
DeleteTimerQueueTimer
DuplicateHandle
EncodePointer
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
FreeLibraryAndExitThread
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStringsW
GetFileType
GetLastError
GetLogicalProcessorInformation
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetNumaHighestNodeNumber
GetOEMCP
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
GetThreadPriority
GetThreadTimes
GetTickCount
GetVersionExW
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
InterlockedFlushSList
InterlockedPopEntrySList
InterlockedPushEntrySList
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
MultiByteToWideChar
QueryDepthSList
QueryPerformanceCounter
RaiseException
RegisterWaitForSingleObject
ReleaseSemaphore
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwindEx
RtlVirtualUnwind
SetEvent
SetFilePointerEx
SetLastError
SetStdHandle
SetThreadAffinityMask
SetThreadPriority
SetUnhandledExceptionFilter
SignalObjectAndWait
Sleep
SwitchToThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryEnterCriticalSection
UnhandledExceptionFilter
UnregisterWait
UnregisterWaitEx
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObjectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
Exports
Exports
vkCreateDisplayPlaneSurfaceKHR
vkCreateWin32SurfaceKHR
vkDestroySurfaceKHR
vkGetPhysicalDeviceSurfaceCapabilitiesKHR
vkGetPhysicalDeviceSurfaceFormatsKHR
vkGetPhysicalDeviceSurfacePresentModesKHR
vkGetPhysicalDeviceSurfaceSupportKHR
vk_icdGetInstanceProcAddr
vk_icdGetPhysicalDeviceProcAddr
vk_icdNegotiateLoaderICDInterfaceVersion
Sections
.text Size: 218KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ