E:\pHQECvUSzhOym\RhqcbBvtf\cfWyulvspXTfvh\gsUwoWvjoz\nVyjYujJjyjnmz.pdb
Static task
static1
Behavioral task
behavioral1
Sample
45f937744827b9552eb7f440b81b1612_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45f937744827b9552eb7f440b81b1612_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
45f937744827b9552eb7f440b81b1612_JaffaCakes118
-
Size
267KB
-
MD5
45f937744827b9552eb7f440b81b1612
-
SHA1
606a7a9e79adc8eb6aa43f7bff0b2dbd9246da6e
-
SHA256
c3ea88e093a89d961416d99ac475c3947e0e3ac1caa6da3e2702c136c80e740b
-
SHA512
c0a61f6f4b6aee91c201f7c418b53d86002e4752d0b0fb322b458d6897a5768bba34aed8a3007ce703683e2e59a130f6883501faf3d030c36fd9be625d96ccef
-
SSDEEP
6144:PweHzS5yrCCwVwette322cmfGSwk/Nj1uni:PweHz6MKCLOS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45f937744827b9552eb7f440b81b1612_JaffaCakes118
Files
-
45f937744827b9552eb7f440b81b1612_JaffaCakes118.dll windows:5 windows x86 arch:x86
62258214c05ac8f21a3b5c578655160d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ntoskrnl.exe
IoCheckQuotaBufferValidity
ZwCreateKey
DbgBreakPoint
IoAllocateIrp
IoCreateStreamFileObjectLite
KeSynchronizeExecution
IoReadPartitionTableEx
KeInitializeQueue
IoInvalidateDeviceState
MmAllocateMappingAddress
ExSystemTimeToLocalTime
RtlTimeToSecondsSince1970
IoGetTopLevelIrp
RtlNumberOfClearBits
KeQueryInterruptTime
KeGetCurrentThread
IoGetRelatedDeviceObject
IoFreeIrp
IoUnregisterFileSystem
RtlCopyUnicodeString
IoConnectInterrupt
KeTickCount
IoSetPartitionInformation
CcFastCopyWrite
IoInvalidateDeviceRelations
CcUninitializeCacheMap
ObReleaseObjectSecurity
RtlFindClearBitsAndSet
KeReadStateMutex
MmForceSectionClosed
MmFreePagesFromMdl
RtlCharToInteger
IoSetThreadHardErrorMode
CcMdlRead
RtlTimeFieldsToTime
IoIsWdmVersionAvailable
KeInsertByKeyDeviceQueue
PsReferencePrimaryToken
IoReadDiskSignature
RtlVerifyVersionInfo
ZwSetSecurityObject
IoGetBootDiskInformation
RtlFreeOemString
MmUnsecureVirtualMemory
SeAccessCheck
ZwQueryObject
PsChargeProcessPoolQuota
DbgBreakPointWithStatus
KeEnterCriticalRegion
ExDeletePagedLookasideList
CcGetFileObjectFromBcb
ObfReferenceObject
MmFreeMappingAddress
IoGetDeviceProperty
CcRepinBcb
KeClearEvent
ZwEnumerateKey
ZwCreateSection
RtlEqualUnicodeString
IoThreadToProcess
ExCreateCallback
CcPreparePinWrite
SeDeassignSecurity
IoGetInitialStack
CcSetReadAheadGranularity
ZwWriteFile
RtlCreateSecurityDescriptor
RtlEqualString
RtlDeleteNoSplay
KeWaitForSingleObject
RtlCreateAcl
CcUnpinData
KeLeaveCriticalRegion
KeSetTimerEx
IoCancelIrp
IoSetHardErrorOrVerifyDevice
KeInitializeTimer
RtlCheckRegistryKey
Exports
Exports
?LoadFilePathExA@@YGHK<V
?ModifyWindowInfoA@@YGFPAN<V
?RtlMonitorOld@@YGXK_NK<V
?KillKeyNameW@@YGMJE<V
?GetFile@@YGXPADHPAJPA_N<V
?InvalidateFileExA@@YGIPAKK<V
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vdat Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ