\\cpvsbuild\drops\ModWRRTMQFE\raw\5077\vsbuilt\retail\bin\i386\otkloadr.pdb
Static task
static1
Behavioral task
behavioral1
Sample
74d577ece6d009fb8165c1596ae62a6f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
74d577ece6d009fb8165c1596ae62a6f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
74d577ece6d009fb8165c1596ae62a6f_JaffaCakes118
-
Size
200KB
-
MD5
74d577ece6d009fb8165c1596ae62a6f
-
SHA1
b3c2c3b8cb39cd583c4b864cd8721f983b5e817d
-
SHA256
7e31f04f78c331815b834422085bd21c98e04c1b8cd79b4743a46d8dff8dc244
-
SHA512
da14c5ed793e3d07a11ca15c00f62b4aafa6f0dcc36e0e10632c77ae35b5ffaea792011f2cf615e441c40cf590e50f6f0a932811e4bb8f76a8136d1e77c4cf16
-
SSDEEP
3072:zyyM9j5rvelJmwdjoY0ghczat7k2Hi7emaA1cs8UL:a99rvHwdj4at7/C7epWf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74d577ece6d009fb8165c1596ae62a6f_JaffaCakes118
Files
-
74d577ece6d009fb8165c1596ae62a6f_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
c0ed8cb3f44c1915f4cf2abbd9de8ef1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrcmpiW
lstrcpyW
GetModuleFileNameW
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
lstrcpynW
lstrcatW
LeaveCriticalSection
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
LockResource
FindResourceExW
GetProcAddress
LoadLibraryW
GetProcessHeap
HeapSize
EnterCriticalSection
RaiseException
lstrlenW
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
FreeLibrary
InterlockedExchange
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
user32
CharNextW
advapi32
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyExW
ole32
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
oleaut32
SafeArrayUnlock
SysFreeString
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
SysAllocStringLen
SysStringLen
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
VariantClear
SafeArrayDestroy
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
SafeArrayRedim
SafeArrayCreate
VariantCopyInd
SafeArrayLock
wininet
InternetSetOptionW
InternetAutodial
InternetGetConnectedState
GetUrlCacheEntryInfoW
InternetCombineUrlW
urlmon
CoInternetQueryInfo
mscoree
CorBindToRuntimeEx
shlwapi
PathIsRelativeW
PathIsURLW
PathFindExtensionW
msvcr71
_onexit
__dllonexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
wcsrchr
memset
iswspace
wcslen
memmove
wcscspn
wcsspn
wcsstr
wcscmp
??_U@YAPAXI@Z
realloc
wcsncpy
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
_except_handler3
_CxxThrowException
free
malloc
??_V@YAXPAX@Z
??3@YAXPAX@Z
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 568B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE