\\cpvsbuild\drops\ModWRRTMQFE\raw\5077\vsbuilt\retail\bin\i386\otkloadr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3d0a45226dc3ee007015e302b51f5538_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d0a45226dc3ee007015e302b51f5538_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3d0a45226dc3ee007015e302b51f5538_JaffaCakes118
-
Size
132KB
-
MD5
3d0a45226dc3ee007015e302b51f5538
-
SHA1
8b6c084122757a68868aa8601d67b7efa61436b5
-
SHA256
cd48c084e8b094f9ab2740ee716396468b0baac6a140a1cfe8fd46e1f8fb6a98
-
SHA512
1a59b39b97e5688ffa256f937b74552fe3d0b764da3a3b9f5dec4713f7ceb63d4686944f6f3e498e8dfdb2ab2864339cfb7cccd957e01cf57effbb6d5723661c
-
SSDEEP
3072:AIyDq8ZPSQJmwdjqSFPOWs8+FXVdBh1M+YlY0:MpZP8wdjqwPNs8sRhi+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3d0a45226dc3ee007015e302b51f5538_JaffaCakes118
Files
-
3d0a45226dc3ee007015e302b51f5538_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
c0ed8cb3f44c1915f4cf2abbd9de8ef1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrcmpiW
lstrcpyW
GetModuleFileNameW
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
lstrcpynW
lstrcatW
LeaveCriticalSection
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
LockResource
FindResourceExW
GetProcAddress
LoadLibraryW
GetProcessHeap
HeapSize
EnterCriticalSection
RaiseException
lstrlenW
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
FreeLibrary
InterlockedExchange
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
user32
CharNextW
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
ole32
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
oleaut32
SafeArrayUnlock
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
SysAllocStringLen
SysStringLen
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SafeArrayDestroy
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
SafeArrayRedim
SafeArrayCreate
VariantCopyInd
SafeArrayLock
wininet
InternetSetOptionW
InternetAutodial
InternetGetConnectedState
GetUrlCacheEntryInfoW
InternetCombineUrlW
urlmon
CoInternetQueryInfo
mscoree
CorBindToRuntimeEx
shlwapi
PathIsRelativeW
PathIsURLW
PathFindExtensionW
msvcr71
_onexit
__dllonexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
wcsrchr
memset
iswspace
wcslen
memmove
wcscspn
wcsspn
wcsstr
wcscmp
??_U@YAPAXI@Z
realloc
wcsncpy
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
_except_handler3
_CxxThrowException
free
malloc
??_V@YAXPAX@Z
??3@YAXPAX@Z
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ