C:\build\source\rpappdemon\rel32\rpappdemon.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5f75a374cc3dedcb3150cf1f56be1ce8_JaffaCakes118.dll
Resource
win7-20240704-en
General
-
Target
5f75a374cc3dedcb3150cf1f56be1ce8_JaffaCakes118
-
Size
115KB
-
MD5
5f75a374cc3dedcb3150cf1f56be1ce8
-
SHA1
04174c14af30350c81d24c4a545e6258cbe895ec
-
SHA256
948803fde2dd8f030f0944819507b641f1fb0eaf547309da2f96515138172e86
-
SHA512
0020ed68e7a59e84a0e871878270c756fe4163bd0aecb8a91e0076ac21e31a3f0295ce88852908d24153db3c71b3e359d552f03ef16b9794b2d301d6a840afc7
-
SSDEEP
3072:9sm4/ij9OKmuBXn6vn+m5Av+3ywTZ7oWMy4Yq/:umLj9OKmiXn6/+magVWL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5f75a374cc3dedcb3150cf1f56be1ce8_JaffaCakes118
Files
-
5f75a374cc3dedcb3150cf1f56be1ce8_JaffaCakes118.dll windows:5 windows x86 arch:x86
58e8e4ba36438f2d50bd11656658353e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
FreeLibrary
LoadLibraryA
SetErrorMode
GetProcAddress
DisableThreadLibraryCalls
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
InterlockedExchange
user32
CharNextA
GetSystemMetrics
msvcr90
__CxxFrameHandler3
strstr
_stricmp
strchr
??_V@YAXPAX@Z
??_U@YAPAXI@Z
memset
free
realloc
malloc
??0exception@std@@QAE@ABV01@@Z
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_crt_debugger_hook
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
__clean_type_info_names_internal
_CxxThrowException
_invalid_parameter_noinfo
_unlock
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
_purecall
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
_putenv
printf
msvcp90
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
Exports
Exports
RMACreateInstance
RMAShutdown
SetDLLAccessPath
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE