E:\pHQECvUSzhOym\RhqcbBvtf\cfWyulvspXTfvh\gsUwoWvjoz\nVyjYujJjyjnmz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3760efae2f731d9c7cd18e0ab0ac039a_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3760efae2f731d9c7cd18e0ab0ac039a_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3760efae2f731d9c7cd18e0ab0ac039a_JaffaCakes118
-
Size
445KB
-
MD5
3760efae2f731d9c7cd18e0ab0ac039a
-
SHA1
3c73f1b0952617df7667ec23c81cc1cda8db4763
-
SHA256
a4223513197e59c45a2ac08cf10eac8aced7a974110ec750b0bd54300ea4f4cf
-
SHA512
600eb28da6b05b6c6af8ea20aa5d33468147fde641291dfacce1a7f67739e43c8ab6aec09621d791443ba6d556da4bf7cae8e6faea2ddf4caa783182ed044a94
-
SSDEEP
12288:HweHz62yOPuKt1eUApSRYdFWGxt+vFX3k:QeT6XOMpSRYdFWGxkvFH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3760efae2f731d9c7cd18e0ab0ac039a_JaffaCakes118
Files
-
3760efae2f731d9c7cd18e0ab0ac039a_JaffaCakes118.dll windows:5 windows x86 arch:x86
62258214c05ac8f21a3b5c578655160d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
IoCheckQuotaBufferValidity
ZwCreateKey
DbgBreakPoint
IoAllocateIrp
IoCreateStreamFileObjectLite
KeSynchronizeExecution
IoReadPartitionTableEx
KeInitializeQueue
IoInvalidateDeviceState
MmAllocateMappingAddress
ExSystemTimeToLocalTime
RtlTimeToSecondsSince1970
IoGetTopLevelIrp
RtlNumberOfClearBits
KeQueryInterruptTime
KeGetCurrentThread
IoGetRelatedDeviceObject
IoFreeIrp
IoUnregisterFileSystem
RtlCopyUnicodeString
IoConnectInterrupt
KeTickCount
IoSetPartitionInformation
CcFastCopyWrite
IoInvalidateDeviceRelations
CcUninitializeCacheMap
ObReleaseObjectSecurity
RtlFindClearBitsAndSet
KeReadStateMutex
MmForceSectionClosed
MmFreePagesFromMdl
RtlCharToInteger
IoSetThreadHardErrorMode
CcMdlRead
RtlTimeFieldsToTime
IoIsWdmVersionAvailable
KeInsertByKeyDeviceQueue
PsReferencePrimaryToken
IoReadDiskSignature
RtlVerifyVersionInfo
ZwSetSecurityObject
IoGetBootDiskInformation
RtlFreeOemString
MmUnsecureVirtualMemory
SeAccessCheck
ZwQueryObject
PsChargeProcessPoolQuota
DbgBreakPointWithStatus
KeEnterCriticalRegion
ExDeletePagedLookasideList
CcGetFileObjectFromBcb
ObfReferenceObject
MmFreeMappingAddress
IoGetDeviceProperty
CcRepinBcb
KeClearEvent
ZwEnumerateKey
ZwCreateSection
RtlEqualUnicodeString
IoThreadToProcess
ExCreateCallback
CcPreparePinWrite
SeDeassignSecurity
IoGetInitialStack
CcSetReadAheadGranularity
ZwWriteFile
RtlCreateSecurityDescriptor
RtlEqualString
RtlDeleteNoSplay
KeWaitForSingleObject
RtlCreateAcl
CcUnpinData
KeLeaveCriticalRegion
KeSetTimerEx
IoCancelIrp
IoSetHardErrorOrVerifyDevice
KeInitializeTimer
RtlCheckRegistryKey
Exports
Exports
?LoadFilePathExA@@YGHK<V
?ModifyWindowInfoA@@YGFPAN<V
?RtlMonitorOld@@YGXK_NK<V
?KillKeyNameW@@YGMJE<V
?GetFile@@YGXPADHPAJPA_N<V
?InvalidateFileExA@@YGIPAKK<V
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vdat Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ