Q:\kplGYzRc\HkYhihxNHp\dkodkiammw\wsuKbAyehYH\XxxvydpRok.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0f785d5e990eb074a2f794224be458c7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f785d5e990eb074a2f794224be458c7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0f785d5e990eb074a2f794224be458c7_JaffaCakes118
-
Size
159KB
-
MD5
0f785d5e990eb074a2f794224be458c7
-
SHA1
32007ae38e119cdeaab27091de62577713369702
-
SHA256
798cf526258eb066886c44968859613ac83fed102c597497b83c714920cb2979
-
SHA512
c6c4c761563cff151c2f9d28d97ee519adec79ac9d3f2f897af1d37685554e48b83386039e9fa0eec6ae02349dbbae31c64e5e7342a22f2a584d6b7b5841d0e9
-
SSDEEP
3072:OKUlfbFI95uZwIRj5DdZHveIn0C2cJaJFs0r9gkJKqDm+TAnBRjvt:ZwBrDdZR0C2ckJ4f+iBRjv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f785d5e990eb074a2f794224be458c7_JaffaCakes118
Files
-
0f785d5e990eb074a2f794224be458c7_JaffaCakes118.dll windows:5 windows x86 arch:x86
571dd8aeff3405f93d1f04aaa167377a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
SeCaptureSubjectContext
SeDeleteObjectAuditAlarm
CcDeferWrite
IoBuildPartialMdl
IoFreeIrp
SeTokenIsRestricted
IoCheckShareAccess
IoGetLowerDeviceObject
ZwCreateSection
ZwQuerySymbolicLinkObject
KeEnterCriticalRegion
FsRtlNotifyInitializeSync
IoGetInitialStack
IoWMIRegistrationControl
ZwOpenSymbolicLinkObject
KeReadStateTimer
IoDeviceObjectType
KeGetCurrentThread
RtlGetVersion
MmUnlockPages
IoGetDmaAdapter
RtlUnicodeStringToInteger
SeSetSecurityDescriptorInfo
RtlUpcaseUnicodeString
ExIsProcessorFeaturePresent
RtlIsNameLegalDOS8Dot3
CcGetFileObjectFromBcb
KeInitializeDeviceQueue
ObfReferenceObject
KeDetachProcess
MmCanFileBeTruncated
ObReferenceObjectByPointer
IoThreadToProcess
KeTickCount
IoGetAttachedDevice
IofCallDriver
IoGetDeviceInterfaceAlias
FsRtlDeregisterUncProvider
IoInitializeIrp
DbgBreakPoint
KeLeaveCriticalRegion
RtlCreateSecurityDescriptor
ZwOpenFile
KeInsertByKeyDeviceQueue
IoVerifyVolume
IoDeleteController
CcMdlRead
Exports
Exports
?IsNotPenEx@@YGPAFIGPAJG<V
?DeleteDirectory@@YGXEPAGME<V
?IsNotCommandLineW@@YGPAIGMPAF<V
?PutMessageEx@@YGMPA_N<V
?PutObject@@YGPADFPAMPAJPA_N<V
?EnumConfigExW@
Sections
.text Size: 65KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE