E:\cujXIMlQbJ\oBfEJpgJywmnc\uoqDeqgJDzke.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e070598a075c6c34bccdb789bea0ac80_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e070598a075c6c34bccdb789bea0ac80_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e070598a075c6c34bccdb789bea0ac80_JaffaCakes118
-
Size
70KB
-
MD5
e070598a075c6c34bccdb789bea0ac80
-
SHA1
20af916d552a14f7a4fc7b76cde207eb91f81280
-
SHA256
7426565b4357565aff009ac0487cf0201d752a3f89ba1dddb7ab5643f6f3d8b1
-
SHA512
6c8cd9e0d99b620d781fcf1bb242d4e700656d9bde8a2436491ec52b38d48c5017b0c76f67f6f7b33a8a8e82928fd8cc8b31c5e361b1c00f6d9ea22ca7e836fb
-
SSDEEP
1536:P+N8E5/7qGGp2dNmD+fI5yAVXBLR5hG2KIL9J:TE5/7qGhTi5PxLBR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e070598a075c6c34bccdb789bea0ac80_JaffaCakes118
Files
-
e070598a075c6c34bccdb789bea0ac80_JaffaCakes118.dll windows:5 windows x86 arch:x86
5b96622df6e48994c12093070739d38e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
ZwQueryValueKey
IoSetDeviceInterfaceState
RtlAnsiCharToUnicodeChar
ZwDeleteKey
ObReleaseObjectSecurity
MmAllocateMappingAddress
ZwEnumerateValueKey
IoCreateDevice
KeInitializeSpinLock
MmFlushImageSection
RtlFindClearRuns
RtlLengthRequiredSid
ObReferenceObjectByPointer
IoAllocateErrorLogEntry
RtlSecondsSince1970ToTime
KeDeregisterBugCheckCallback
CcPurgeCacheSection
MmUnlockPages
RtlSplay
IoCreateSymbolicLink
IoGetRelatedDeviceObject
MmIsAddressValid
ZwPowerInformation
IoVerifyVolume
IoFreeErrorLogEntry
RtlGetCallersAddress
ProbeForWrite
RtlInitUnicodeString
IoReleaseCancelSpinLock
MmGetSystemRoutineAddress
RtlGenerate8dot3Name
VerSetConditionMask
IofCallDriver
KeReadStateEvent
KeInitializeSemaphore
SeLockSubjectContext
MmLockPagableSectionByHandle
MmQuerySystemSize
RtlRandom
ExInitializeResourceLite
RtlLengthSecurityDescriptor
ExReleaseFastMutexUnsafe
PsGetProcessId
IoGetTopLevelIrp
KeFlushQueuedDpcs
PsImpersonateClient
IoStartPacket
RtlCreateAcl
RtlAddAccessAllowedAceEx
ExIsProcessorFeaturePresent
RtlxOemStringToUnicodeSize
FsRtlIsTotalDeviceFailure
RtlFreeOemString
CcUninitializeCacheMap
ZwOpenSection
RtlCopySid
ExQueueWorkItem
IoDeleteController
IoInvalidateDeviceState
RtlFindLeastSignificantBit
SeAccessCheck
MmFreeNonCachedMemory
RtlInitializeBitMap
IoFreeController
MmFreeMappingAddress
KeInsertDeviceQueue
IoGetLowerDeviceObject
PsLookupThreadByThreadId
IoAcquireCancelSpinLock
KeRemoveEntryDeviceQueue
IoAllocateWorkItem
KeBugCheckEx
ExAcquireResourceSharedLite
IoQueryFileInformation
KeRundownQueue
SeAppendPrivileges
ObfDereferenceObject
IoInvalidateDeviceRelations
IoCreateStreamFileObjectLite
ZwCreateEvent
PsGetCurrentThreadId
RtlFreeAnsiString
FsRtlNotifyInitializeSync
SeAssignSecurity
CcPinRead
IoInitializeTimer
MmAdvanceMdl
KeResetEvent
ZwOpenKey
FsRtlCheckLockForReadAccess
RtlCopyLuid
ObGetObjectSecurity
RtlPrefixUnicodeString
IoGetDriverObjectExtension
ZwSetSecurityObject
IoDisconnectInterrupt
MmIsVerifierEnabled
KeQuerySystemTime
ExFreePoolWithTag
IoBuildPartialMdl
IoGetDeviceInterfaceAlias
RtlCreateUnicodeString
CcSetDirtyPinnedData
PsIsThreadTerminating
KeRemoveQueue
ExSetTimerResolution
MmBuildMdlForNonPagedPool
ZwOpenProcess
ZwCreateSection
KeRemoveDeviceQueue
IoInitializeIrp
ExVerifySuite
CcSetFileSizes
IoVolumeDeviceToDosName
KeUnstackDetachProcess
RtlUnicodeStringToOemString
WmiQueryTraceInformation
KeQueryActiveProcessors
KeSetSystemAffinityThread
ZwFreeVirtualMemory
IoIsOperationSynchronous
IoSetPartitionInformationEx
MmProbeAndLockProcessPages
PsRevertToSelf
CcMdlWriteAbort
MmSetAddressRangeModified
FsRtlMdlWriteCompleteDev
ExReleaseResourceLite
RtlFindMostSignificantBit
ZwQueryKey
CcFastMdlReadWait
MmMapIoSpace
RtlInsertUnicodePrefix
RtlInitAnsiString
RtlOemStringToUnicodeString
ExRaiseStatus
RtlTimeToSecondsSince1970
IoGetAttachedDeviceReference
RtlVolumeDeviceToDosName
IoRegisterDeviceInterface
KeDetachProcess
RtlCompareString
ObQueryNameString
KeEnterCriticalRegion
MmIsThisAnNtAsSystem
FsRtlFastUnlockSingle
KeReadStateSemaphore
ZwClose
IoReportResourceForDetection
KeSetImportanceDpc
KeLeaveCriticalRegion
PsGetCurrentProcess
MmUnlockPagableImageSection
IoCheckEaBufferValidity
KeReadStateTimer
IoFreeIrp
MmProbeAndLockPages
SeValidSecurityDescriptor
RtlSetAllBits
SeQueryInformationToken
KeSetEvent
ExRaiseDatatypeMisalignment
SeReleaseSubjectContext
CcUnpinDataForThread
KeSetKernelStackSwapEnable
IoReadPartitionTable
ZwUnloadDriver
MmSizeOfMdl
KeInsertHeadQueue
ZwCreateKey
HalExamineMBR
IoVerifyPartitionTable
PsChargeProcessPoolQuota
KeSetTimer
SeSinglePrivilegeCheck
ProbeForRead
RtlInt64ToUnicodeString
RtlEqualString
ZwFlushKey
PsGetCurrentProcessId
ZwCreateDirectoryObject
PsGetThreadProcessId
SeQueryAuthenticationIdToken
ExSetResourceOwnerPointer
RtlStringFromGUID
IofCompleteRequest
ExUuidCreate
RtlDowncaseUnicodeString
RtlGetVersion
IoWMIWriteEvent
RtlInitializeSid
RtlFillMemoryUlong
MmResetDriverPaging
MmUnsecureVirtualMemory
KeSynchronizeExecution
IoOpenDeviceRegistryKey
IoReleaseRemoveLockAndWaitEx
RtlGetNextRange
ZwMakeTemporaryObject
MmIsDriverVerifying
KefAcquireSpinLockAtDpcLevel
ZwLoadDriver
KeRevertToUserAffinityThread
IoAcquireVpbSpinLock
RtlEnumerateGenericTable
IoIsSystemThread
IoDeviceObjectType
ZwNotifyChangeKey
ZwSetVolumeInformationFile
FsRtlAllocateFileLock
RtlInitString
DbgBreakPoint
ExAcquireFastMutexUnsafe
MmFreeContiguousMemory
IoCheckShareAccess
RtlAppendUnicodeToString
MmPageEntireDriver
ZwReadFile
PsReturnPoolQuota
PsGetProcessExitTime
IoStopTimer
ObReferenceObjectByHandle
KeReadStateMutex
PsTerminateSystemThread
IoDeleteSymbolicLink
MmHighestUserAddress
KeQueryInterruptTime
KeReleaseSemaphore
KeInitializeDeviceQueue
RtlAnsiStringToUnicodeString
PoRequestPowerIrp
IoGetDiskDeviceObject
RtlValidSid
IoReuseIrp
IoGetAttachedDevice
RtlUnicodeStringToAnsiString
IoFreeWorkItem
RtlClearBits
IoAcquireRemoveLockEx
ExGetSharedWaiterCount
KeWaitForMultipleObjects
IoDetachDevice
FsRtlSplitLargeMcb
CcMdlReadComplete
IoCsqRemoveIrp
MmSecureVirtualMemory
SeFilterToken
RtlEqualSid
IoThreadToProcess
IoRemoveShareAccess
CcMdlRead
ZwFsControlFile
IoSetHardErrorOrVerifyDevice
SeCaptureSubjectContext
RtlAppendStringToString
IoStartNextPacket
CcMapData
ExReinitializeResourceLite
CcGetFileObjectFromBcb
Exports
Exports
?FormatWidthExA@@YGXKPAGPAJPAH[W
?GenerateEventW@@YGXJ[W
?CloseRectA@@YGIH[W
?ValidateKeyboardExW@@YGJMPAGD[W
?IsValidMediaTypeEx@@YGXPAJ[W
?CallFullNameA@@YGFKH[W
?IsValidDateOriginal@@YGNHEHPAH[W
?FormatFullNameEx@@YGDPAEPAFPADJ[W
?KillDialog@@YGPAXPAJHPANG[W
?RemoveSemaphoreOriginal@@YGXG[W
?ModifySystemA@@YGJPAE_N[W
?GenerateSectionEx@@YGXPAEPADG[W
?InstallPointOriginal@@YGPAXPAHEE[W
?OnMutantOriginal@@YGHE[W
?IsSystemOld@@YGGDPAGE[W
?DecrementFolderExA@@YG_NHPAGPAD[W
?IsValidStringNew@@YGHM_NH[W
?KillScreenEx@@YGKNPAEPAKM[W
?PutMediaType@@YGPAXIPAIPAK[W
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ