M:\tgSoc\acbJRzB\voCfugHE\XsNwBdte\pWtekv.pdb
Static task
static1
Behavioral task
behavioral1
Sample
df6925570053fdea2344fa2622f0b9da_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df6925570053fdea2344fa2622f0b9da_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
df6925570053fdea2344fa2622f0b9da_JaffaCakes118
-
Size
960KB
-
MD5
df6925570053fdea2344fa2622f0b9da
-
SHA1
3769e6b4995083f455254d710474402769fe113c
-
SHA256
27af88edb36189d96d20012aeef7e198bbe14c4daea4ab8d5137305b4b2fed66
-
SHA512
f81bff04ca894db64e60cabd4574dd9f1932770abbc41be9ace730f1b8dae15893ebdac62187f5f889a3e2c3b45982c892d9cdbf060132a2df3bc8ba16d59647
-
SSDEEP
24576:uAlv1/vrZkZ5OFOQzYYTNuRPyQD9mm6VjK6zGVp:uOtkrmTIBDw7jZzGX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df6925570053fdea2344fa2622f0b9da_JaffaCakes118
Files
-
df6925570053fdea2344fa2622f0b9da_JaffaCakes118.dll windows:5 windows x86 arch:x86
ff3a8316a3eff3b67e38e926c1104927
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
PsGetCurrentThread
MmMapIoSpace
RtlCreateSecurityDescriptor
IoDisconnectInterrupt
RtlClearAllBits
RtlGetNextRange
ZwClose
CcCopyRead
ZwOpenKey
RtlInitString
RtlCompareString
KeInsertDeviceQueue
RtlRemoveUnicodePrefix
ExIsProcessorFeaturePresent
RtlxAnsiStringToUnicodeSize
RtlTimeToSecondsSince1980
FsRtlGetNextFileLock
RtlCompareUnicodeString
SeDeleteObjectAuditAlarm
RtlInitUnicodeString
Exports
Exports
?tdxtZGuzSnnzRbfq@@YGGHPAF@Z
Sections
.text Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ