p:\vc5\release\null.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2e47b91e5cd2b3bcbb4fb1913a5d7e2c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e47b91e5cd2b3bcbb4fb1913a5d7e2c_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2e47b91e5cd2b3bcbb4fb1913a5d7e2c_JaffaCakes118
-
Size
26KB
-
MD5
2e47b91e5cd2b3bcbb4fb1913a5d7e2c
-
SHA1
5da37289311baac160c50c004f4cee2fb0e83a78
-
SHA256
72920fb283db2a8b2c688124ad994d61c25489c22dac375d5f0f4d1ab1e843d8
-
SHA512
752aeb7e7a1147d5a6d43653c7b611e35447f4b49ac21eded18873ebf02a9a33ebe852c5b0efe825b063987d7b8ff1e68a50d1b8b2645db3d7985c2a69c2975a
-
SSDEEP
768:bTRO9ZicEojES0KBQWK+CbcxFBoMjPxSoZV:blO9tzl0Eo9E3oMjLZV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2e47b91e5cd2b3bcbb4fb1913a5d7e2c_JaffaCakes118
Files
-
2e47b91e5cd2b3bcbb4fb1913a5d7e2c_JaffaCakes118.dll windows:5 windows x86 arch:x86
983ebf5df793d7a20b6ddcd1c3ef4e5c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
ObfDereferenceObject
ExAllocatePool
ExFreePoolWithTag
ZwClose
ZwOpenFile
ZwQueryInformationFile
ZwCreateSection
ZwMapViewOfSection
ZwUnmapViewOfSection
ZwDeleteFile
swprintf
RtlInitUnicodeString
ZwOpenKey
ZwQueryKey
RtlStringFromGUID
RtlFreeUnicodeString
ZwQueryValueKey
ZwSetValueKey
ZwCreateKey
PsGetVersion
sprintf
strchr
IoFreeWorkItem
IoAllocateWorkItem
IoQueueWorkItem
KeCancelTimer
KeFlushQueuedDpcs
IoDeleteDevice
IofCompleteRequest
IoCreateDevice
ObMakeTemporaryObject
KeInitializeTimer
KeInitializeDpc
KeSetTimerEx
KeInsertQueue
KeQuerySystemTime
KeRemoveQueue
KeRundownQueue
IoFreeIrp
KeInitializeQueue
ObfReferenceObject
PsCreateSystemThread
ZwCreateFile
ObReferenceObjectByHandle
IoBuildDeviceIoControlRequest
IofCallDriver
KeSetTimer
ExQueueWorkItem
RtlIpv4StringToAddressW
ZwEnumerateKey
RtlIpv4AddressToStringA
ZwQueryVolumeInformationFile
ZwReadFile
ZwWriteFile
ZwSetInformationFile
ZwOpenEvent
ZwQuerySystemInformation
ZwOpenProcess
ZwOpenProcessToken
ZwQueryInformationToken
RtlEqualSid
ZwQueryInformationProcess
DbgPrint
memcpy
memset
_alldiv
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ