Static task
static1
Behavioral task
behavioral1
Sample
db1d560bfcbdd3b5ad6ee03f74f9ff8a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db1d560bfcbdd3b5ad6ee03f74f9ff8a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
db1d560bfcbdd3b5ad6ee03f74f9ff8a_JaffaCakes118
-
Size
65KB
-
MD5
db1d560bfcbdd3b5ad6ee03f74f9ff8a
-
SHA1
74d98962a7a1d1d6e35bf5ff5da1492a91c6beca
-
SHA256
dafa734f11fd40bc6531b7745cc10b07429a58452f6f9f98f1d1691d0667933b
-
SHA512
9fdcabd6771d2b81c7e43b2046fb9853471be20ec4a9bb9885da5ab95c6eba23ca80168f475d56da6d5e5a5ac56344fe4a3321918290436fe0fdbed9bd387fcd
-
SSDEEP
768:LYUvvQrPHrtT7mV1+gb59LYKTVd+TFWK4eoJDeX9ZMmNcZrB0yFym8lqa:LYUaPVmV1Db/L7uFWK4e19I9Qm8l1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource db1d560bfcbdd3b5ad6ee03f74f9ff8a_JaffaCakes118
Files
-
db1d560bfcbdd3b5ad6ee03f74f9ff8a_JaffaCakes118.dll windows:5 windows x86 arch:x86
048e60a4b39e8f9423868e3b12db0fd5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntoskrnl.exe
KeInitializeEvent
KeEnterCriticalRegion
ExAcquireFastMutexUnsafe
ExReleaseFastMutexUnsafe
KeLeaveCriticalRegion
ExAllocatePool
ExFreePoolWithTag
RtlInsertElementGenericTableAvl
RtlDeleteElementGenericTableAvl
RtlInitializeGenericTableAvl
NtOpenFile
NtQueryVolumeInformationFile
NtClose
swprintf
RtlInitUnicodeString
ObReferenceObjectByHandle
IoGetRelatedDeviceObject
ExAcquireResourceExclusiveLite
ExReleaseResourceLite
ExAcquireResourceSharedLite
ZwCreateFile
IoGetStackLimits
MmFlushImageSection
CcInitializeCacheMap
CcPurgeCacheSection
CcSetFileSizes
ZwClose
MmMapLockedPagesSpecifyCache
CcFlushCache
CcUninitializeCacheMap
IofCallDriver
IofCompleteRequest
IoSetInformation
CcCopyWrite
FsRtlCopyRead
IoCreateDevice
ZwAllocateVirtualMemory
ZwQuerySystemInformation
_stricmp
ZwOpenThread
ZwQueryInformationThread
PsLookupProcessByProcessId
PsGetProcessPeb
KeStackAttachProcess
ProbeForRead
RtlEqualUnicodeString
ExDeleteResourceLite
PsLookupProcessThreadByCid
KeInitializeApc
ObfReferenceObject
KeInsertQueueApc
KeDelayExecutionThread
PsCreateSystemThread
ZwOpenKey
ZwQueryValueKey
ZwSetValueKey
ZwOpenFile
ZwQueryObject
ZwQueryInformationFile
ZwDeviceIoControlFile
ZwCreateSymbolicLinkObject
ZwCreateDirectoryObject
ZwWriteFile
ZwCreateSection
IoGetCurrentProcess
ZwOpenSection
ZwMapViewOfSection
MmAllocatePagesForMdl
MmUnmapLockedPages
MmFreePagesFromMdl
ZwUnmapViewOfSection
RtlHashUnicodeString
ZwReadFile
IoFreeIrp
KeSetEvent
RtlPrefixUnicodeString
IoAllocateIrp
KeWaitForSingleObject
ExAllocatePoolWithTag
ZwEnumerateKey
ZwDeleteKey
PoStartNextPowerIrp
PoCallDriver
ZwFlushVirtualMemory
ZwQueryKey
ZwSetSystemInformation
IoCreateDriver
ObMakeTemporaryObject
ZwDeleteFile
ObReferenceObjectByName
IoDriverObjectType
IoEnumerateDeviceObjectList
wcsrchr
ExInitializeResourceLite
IoQueryFileInformation
KeUnstackDetachProcess
ObfDereferenceObject
_allmul
_except_handler3
memcpy
memset
hal
KfLowerIrql
KeGetCurrentIrql
KfRaiseIrql
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ