d:\cm\build\public\htmlRenderer_09_12_06_1\sdks\aol\htmlRenderer\src\Release\hrs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1bb0f4ca19033c1467b4cdbe9ad4db23_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1bb0f4ca19033c1467b4cdbe9ad4db23_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
1bb0f4ca19033c1467b4cdbe9ad4db23_JaffaCakes118
-
Size
200KB
-
MD5
1bb0f4ca19033c1467b4cdbe9ad4db23
-
SHA1
c2a64e0eeced4e17c0c323434a839bf7de871a02
-
SHA256
2a6d784af499195f73dc366f818889efa4dc2a766d77772f936845f6b2dac119
-
SHA512
d6a829032a05b29c7b75400d14129c2f7558ed5d68e03284af7d33f5bd76a6f9b59926a8793b7e57ab188523ef0b653df600f3c330fec2130ef16618f15f1952
-
SSDEEP
3072:9PKoieUz6SsRlIK+mbcq4WdPxZRGBsG80y3dY65QTrxZpIFtFP0KTj8PJQiKEzrp:9yoieUgl+Pq4WdPxZRciNqTsyQNFO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1bb0f4ca19033c1467b4cdbe9ad4db23_JaffaCakes118
Files
-
1bb0f4ca19033c1467b4cdbe9ad4db23_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
cfa4c6d3b31763a7a5520f3dde078aa8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
urlmon
CreateURLMoniker
kernel32
GetLocaleInfoA
GetThreadLocale
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
FlushInstructionCache
GetCurrentProcess
HeapFree
GetProcessHeap
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
GetLastError
FreeLibrary
GetACP
LoadResource
CompareStringA
GetModuleHandleA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
SetLastError
CloseHandle
CreateEventW
SetEvent
ResetEvent
InterlockedCompareExchange
ExitProcess
GetVersionExA
InterlockedExchange
SizeofResource
user32
GetClientRect
IsChild
SetWindowPos
SetFocus
GetFocus
IsWindow
MsgWaitForMultipleObjects
DispatchMessageW
TranslateMessage
PeekMessageW
KillTimer
DestroyWindow
SetTimer
advapi32
RegCloseKey
ole32
CoTaskMemAlloc
CoCreateInstance
OleRun
CreateBindCtx
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoRegisterMessageFilter
CoInitializeEx
CoTaskMemRealloc
oleaut32
SysFreeString
SysStringLen
LoadRegTypeLi
LoadTypeLi
VariantInit
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
VariantClear
VariantCopy
VariantChangeType
SafeArrayLock
SafeArrayCreate
SafeArrayUnlock
SafeArrayDestroy
SafeArrayCopy
SafeArrayUnaccessData
SafeArrayGetElement
SafeArrayPutElement
SafeArrayRedim
SysAllocString
shlwapi
PathFindExtensionW
xprt5
?Find@TBstr@XPRT@@QBEHGH@Z
??1TPtrFromPtrMap@XPRT@@QAE@XZ
?GetAt@TBstr@XPRT@@QBEGH@Z
??0TPtrFromPtrMap@XPRT@@QAE@H@Z
?Lookup@TPtrFromPtrMap@XPRT@@QBE_NPAXAAPAX@Z
??ATPtrFromPtrMap@XPRT@@QAEAAPAXPAX@Z
?RemoveKey@TPtrFromPtrMap@XPRT@@QAE_NPAX@Z
?Lock@TSpinLock@XPRT@@QAEXXZ
?Unlock@TSpinLock@XPRT@@QAEXXZ
?SetOptimalLoad@TPtrFromPtrMap@XPRT@@QAEXMMM_N@Z
?SetAt@TPtrFromPtrMap@XPRT@@QAEPAU__POSITION@2@PAX0@Z
?GetNextAssoc@TPtrFromPtrMap@XPRT@@QBEXAAPAU__POSITION@2@AAPAX1@Z
?GetStartPosition@TPtrFromPtrMap@XPRT@@QBEPAU__POSITION@2@XZ
xprt_iswdigit
?GetLength@TBstr@XPRT@@QBEHXZ
?SetCount@TPtrArray@XPRT@@QAE_NHH@Z
?GetDigestSize@TMdXDigest@XPRT@@UBEHXZ
?Finish@TMdXDigest@XPRT@@UAEHPAEH@Z
??0TMessageDigest@XPRT@@QAE@XZ
?Transform@TMd5Digest@XPRT@@EAEXQAIQBE@Z
?Append@TBstr@XPRT@@QAEAAV12@G@Z
?Update@TMessageDigest@XPRT@@QAEXPBEH@Z
xprt_memcpy
xprt_strlen
_XprtInitialize@8
_XprtUninitialize@0
?SetAtGrow@TPtrArray@XPRT@@QAEXHPAX@Z
_XprtCreateThread@8
_XprtGetMilliseconds@0
_XprtDestroyThread@8
?FreeDataChain@SPlex@XPRT@@QAEXXZ
?Create@SPlex@XPRT@@SGPAU12@AAPAU12@II@Z
?RemoveAll@TPtrFromPtrMap@XPRT@@QAEXXZ
?Mid@TBstr@XPRT@@QBE?AV12@HH@Z
?Mid@TBstr@XPRT@@QBE?AV12@H@Z
_XprtAtomicDecrement@4
xprt_memset
_XprtMemAlloc@4
xprt_memmove
?IsEmpty@TBstr@XPRT@@QBE_NXZ
xprt_strcmp
?Assign@TBstr@XPRT@@QAEAAV12@PBDPBG@Z
?GetEncodedString@TBstr@XPRT@@QBEPBDPBG@Z
_XprtAtomicIncrement@4
kSystemEncoding
??0TBstr@XPRT@@QAE@PBDPBG@Z
?GetString@TBstr@XPRT@@QBEPBGXZ
??0TBstr@XPRT@@QAE@PBG@Z
?Add@TPtrArray@XPRT@@QAEHPAX@Z
??1TPtrArray@XPRT@@QAE@XZ
??0TPtrArray@XPRT@@QAE@XZ
?Assign@TBstr@XPRT@@QAEAAV12@PBG@Z
??0TBstr@XPRT@@QAE@ABV01@@Z
?Copy@TBstr@XPRT@@QBEPAGXZ
_XprtMemFree@4
?Detach@TBstr@XPRT@@QAEPAGXZ
?Attach@TBstr@XPRT@@QAEXPAG@Z
?Assign@TBstr@XPRT@@QAEAAV12@ABV12@@Z
??1TBstr@XPRT@@QAE@XZ
?Compare@TBstr@XPRT@@QBEHPBG@Z
??0TBstr@XPRT@@QAE@XZ
msvcrt
wcslen
free
wcsncpy
_purecall
??3@YAXPAX@Z
_wcsicmp
realloc
??2@YAPAXI@Z
memcmp
malloc
wcscpy
memcpy
_except_handler3
memmove
memset
_snwprintf
strcmp
qsort
__dllonexit
_onexit
_initterm
_adjust_fdiv
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
EEGetModuleInterop
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE