y:\libs\cpp\erom\objectmodels\requestmodel\ReleaseUMinSize\RequestModel.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1a39d8a15f838ae142640cd6ec6e9685_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1a39d8a15f838ae142640cd6ec6e9685_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
1a39d8a15f838ae142640cd6ec6e9685_JaffaCakes118
-
Size
746KB
-
MD5
1a39d8a15f838ae142640cd6ec6e9685
-
SHA1
f76d5b434bf7db375bc6008be4c486167aa609e1
-
SHA256
85b7d158690af940ec6d72bed9ea6a2250f1f44a0d3b0100f5340d3d43bf563c
-
SHA512
e7598faf00951d02676da587e91e18969bc1fd8aec67668b5f3362aa1f5455dbc5de82afe846fa2e0247a0f5d10916311da95a377485297f3da25860c9867cee
-
SSDEEP
12288:ubzsewhA9l/r+f1OeJDOBaKqA/iD3brIFVFm8b:kseqAzKsEiBaYiD4FVF/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a39d8a15f838ae142640cd6ec6e9685_JaffaCakes118
Files
-
1a39d8a15f838ae142640cd6ec6e9685_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
43c99bfb87bfafb078e3cc8d08fc7ab7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CompareStringA
GetModuleHandleA
GetWindowsDirectoryA
GetSystemDirectoryA
SetLastError
GetSystemTimeAsFileTime
FreeLibrary
GetCurrentThreadId
LocalAlloc
LoadLibraryA
GetLastError
GetModuleFileNameA
GetTickCount
QueryPerformanceCounter
ExitProcess
GetVersionExA
DisableThreadLibraryCalls
LocalFree
EnterCriticalSection
InterlockedExchange
LeaveCriticalSection
lstrlenA
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
GetCurrentProcessId
user32
MessageBoxA
SetRectEmpty
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
ole32
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
StringFromCLSID
CoCreateFreeThreadedMarshaler
OleRun
oleaut32
VarBstrCat
SysStringLen
SysFreeString
SysAllocString
SysAllocStringByteLen
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantChangeTypeEx
SysStringByteLen
SysAllocStringLen
VarBstrCmp
LoadRegTypeLi
LoadTypeLi
VariantClear
VariantCopy
VariantInit
VarCmp
VariantChangeType
CreateErrorInfo
GetErrorInfo
atl71
ord32
ord58
ord31
ord61
ord22
ord64
ord49
ord15
ord23
ord18
ord30
cxlibw-2-6
??1SWCharString@CXLib206@@QAE@XZ
??0SWCharString@CXLib206@@QAE@ABV01@@Z
??4SWCharString@CXLib206@@QAEAAV01@PBG@Z
??0SWCharString@CXLib206@@QAE@XZ
?Terminate@SResManager@CXLib206@@SA_NXZ
?GetCollection@SResManager@CXLib206@@SA?AV?$CSmartRefCountPtr@VSResCollection@CXLib206@@@2@PBG0QAUHINSTANCE__@@@Z
??B?$SString_t@G$00@CXLib206@@QBEPBGXZ
?Initialize@SResManager@CXLib206@@SA_NXZ
??0SWCharString@CXLib206@@QAE@PBG@Z
?SAssert@CXLib206@@YAXPBDH0@Z
?ShouldAssert@CXLib206@@YA_NPBD@Z
??1SResString@CXLib206@@QAE@XZ
??BSResString@CXLib206@@QBE?AVSWCharString@1@XZ
??6SResString@CXLib206@@QAEAAV01@ABVSWCharString@1@@Z
??0SResString@CXLib206@@QAE@ABVSWCharString@1@ABV?$SChar_t@G$00@1@@Z
??0?$SChar_t@G$00@CXLib206@@QAE@G@Z
??Y?$SString_t@G$00@CXLib206@@QAEAAV01@PBG@Z
msvcp71
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@ABV01@@Z
?begin@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE?AViterator@12@XZ
?c_str@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?compare@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEHPBG@Z
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@PBG@Z
?end@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE?AViterator@12@XZ
?_Nomemory@std@@YAXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBG@Z
??Y?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@PBG@Z
msvcr71
_wcsicmp
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__security_error_handler
_callnewh
swscanf
swprintf
realloc
??0exception@@QAE@ABQBD@Z
?what@exception@@UBEPBDXZ
memmove
iswspace
wcscat
malloc
strlen
strcat
_splitpath
strcpy
_exit
_wsplitpath
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
??1exception@@UAE@XZ
memcmp
memcpy
wcsstr
wcscmp
__CxxFrameHandler
??_V@YAXPAX@Z
??3@YAXPAX@Z
_purecall
free
wcscpy
wcslen
_except_handler3
memset
_CxxThrowException
__CppXcptFilter
_adjust_fdiv
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 267KB - Virtual size: 266KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 151KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE