\\cpvsbuild\drops\ModWRRTM\raw\3191\vsbuilt\retail\bin\i386\otkloadr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3a53373e20d6457f73e977482eabf160_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a53373e20d6457f73e977482eabf160_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3a53373e20d6457f73e977482eabf160_JaffaCakes118
-
Size
172KB
-
MD5
3a53373e20d6457f73e977482eabf160
-
SHA1
07f49e5c6eaa6fbac1038172ca4a6e6776639fd1
-
SHA256
f85fe52e68484b9be82c03ea001bc564f09e1cde07d4f3b70bcc80bc1c884f42
-
SHA512
4c1a18b110df3eb99be628c4711d10c48dfa321ccc472a3ce2eaae3dcb99d2921057aab0a460532df8558f07ccd8cf9a3151b4ee19349ea261239a54bc660663
-
SSDEEP
3072:8BLlL1Yhd1PnhD69vSsQn9jSfzRL2QPIp1VX8jVHg9u6+R+Him57:8LlLEd1V65w2NPIM6+8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a53373e20d6457f73e977482eabf160_JaffaCakes118
Files
-
3a53373e20d6457f73e977482eabf160_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
da81f48e147a767624f5df952ccfbf95
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
LoadLibraryA
DeleteCriticalSection
GetLastError
lstrcmpiW
lstrcpyW
GetModuleFileNameW
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
lstrcpynW
lstrcatW
LeaveCriticalSection
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
LockResource
FindResourceExW
GetProcAddress
LoadLibraryW
GetProcessHeap
HeapSize
EnterCriticalSection
RaiseException
lstrlenW
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
FreeLibrary
InterlockedExchange
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
user32
CharNextW
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
ole32
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
oleaut32
SafeArrayLock
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
SysAllocStringLen
SysStringLen
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SafeArrayUnlock
SafeArrayAccessData
SafeArrayUnaccessData
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
SafeArrayRedim
SafeArrayDestroy
VariantCopyInd
SafeArrayCreate
wininet
InternetSetOptionW
InternetAutodial
InternetGetConnectedState
GetUrlCacheEntryInfoW
InternetCombineUrlW
urlmon
CoInternetQueryInfo
mscoree
CorBindToRuntimeEx
shlwapi
PathIsURLW
PathIsRelativeW
PathFindExtensionW
msvcr71
_onexit
__dllonexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
wcsrchr
iswspace
memset
wcslen
memmove
wcscspn
wcsspn
wcsstr
wcscmp
??_U@YAPAXI@Z
realloc
wcsncpy
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
_except_handler3
_CxxThrowException
free
malloc
??_V@YAXPAX@Z
??3@YAXPAX@Z
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 568B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ