D:\waldo\v1200\engines\cdrpdf\objprodX\CdrPDFCmp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
289802ecf8dac39fa2e8a8b3404c1afc_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
289802ecf8dac39fa2e8a8b3404c1afc_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
289802ecf8dac39fa2e8a8b3404c1afc_JaffaCakes118
-
Size
196KB
-
MD5
289802ecf8dac39fa2e8a8b3404c1afc
-
SHA1
3be3ceb8deeaa21ae10c94271d3e9f235282055f
-
SHA256
c5f3bdd5d20aaf321bca74562ce56a158031af96f730a375eb0694bec7edabf0
-
SHA512
ef7d5eb7c41a2c1e2673a32899a7007d9a0c66c4598ce966ee65c9a2f53b3d4b794ccb15ce509344f1197e11e80551360d7d8744a071110521d70ad91db9bc0e
-
SSDEEP
6144:AxYV/WDeKc+Hl2kCsO/ja6Yb6NsFpHjTaakOm:tVON4G6pKFxaa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 289802ecf8dac39fa2e8a8b3404c1afc_JaffaCakes118
Files
-
289802ecf8dac39fa2e8a8b3404c1afc_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
7abd34d1b39e58bc0cc3134947e69c60
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
crlutl
_UTLGetSpecialFolder@12
_GetUserProfileConfigDir@4
_UTLMakePathName@12
_UTLMapApp2EngGUID@8
?GetInst@IGLB_UILanguage@@SAAAV1@XZ
_UTLMapEng2AppGUID@8
?GetAppClass@WUTLAppInfo@@SA?AW4AppClass@1@XZ
_UTLSplitPath@12
?GetAppID@WUTLAppInfo@@SA?AW4AppID@1@XZ
crlfrmwk
?__ConstructItem@WCmnUI_UIItem_Button@@SGPAVICmnUI_UIItem@@XZ
crli18n
?SetFromUnicode@CGlbChar@@QAGHQBGI@Z
mfc71u
ord1168
ord1182
ord371
ord1908
ord762
ord266
ord265
ord1178
ord896
ord4061
ord5711
ord866
ord764
ord1472
ord287
ord5712
ord774
ord2926
ord282
ord1479
ord280
ord293
ord4026
ord776
ord1220
ord283
ord577
ord5427
ord427
ord664
ord6002
ord313
ord1177
ord1189
ord3508
ord557
ord745
ord1523
ord1176
ord1093
msvcr71
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
memset
_gcvt
_itow
_CxxThrowException
wcsncmp
wcsncpy
malloc
_purecall
free
__CxxFrameHandler
wcscmp
wcslen
wcscpy
_except_handler3
_initterm
realloc
kernel32
LoadLibraryA
FreeLibrary
lstrcatW
lstrcpynW
GetProcAddress
InterlockedIncrement
DisableThreadLibraryCalls
lstrcmpiW
GetLastError
lstrcpyW
lstrlenW
EnterCriticalSection
GetModuleFileNameW
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
WideCharToMultiByte
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
SizeofResource
GetVersionExA
user32
MessageBoxW
CharNextW
advapi32
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
shlwapi
PathFindExtensionW
ole32
StringFromGUID2
CoInitialize
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
oleaut32
SafeArrayAccessData
SafeArrayCreate
SafeArrayDestroy
VariantInit
VariantClear
SafeArrayUnaccessData
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
SysAllocString
SysStringLen
SysFreeString
LoadTypeLi
Exports
Exports
CreateCorelComponent
DestroyCorelComponent
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ