g:\stage\Makalu_M100_stage\devel\3dswin\src\exe\stdplugs\XmlMapMods.dll.pdb
Static task
static1
Behavioral task
behavioral1
Sample
3118b62b1cf7e6e87fd86fb3c0557908_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3118b62b1cf7e6e87fd86fb3c0557908_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3118b62b1cf7e6e87fd86fb3c0557908_JaffaCakes118
-
Size
162KB
-
MD5
3118b62b1cf7e6e87fd86fb3c0557908
-
SHA1
e435e38a92662f3cad84d5dfb9fe6302cf2d2410
-
SHA256
92d0fd64b3367f252e2e686f03bb6fefa59bd6299e374115cbd2856d30f285d2
-
SHA512
9b1d64d7ec283d17bfca85dbca44346e18948882fadcd6387e6c5fd5c6811464a96667bb1f20c3ffdfd26fefd1e3b3eab1b5149db5f95e633a9d81cbd55b77cc
-
SSDEEP
3072:X6BR9D5OlOSuMFjteOW5gw0qVuANh8Q166C3Ajms4cVmG7RpKW8dUeNo4:X2AOJMmOW5gw0Ghxi/+mYqne4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3118b62b1cf7e6e87fd86fb3c0557908_JaffaCakes118
Files
-
3118b62b1cf7e6e87fd86fb3c0557908_JaffaCakes118.dll regsvr32 windows:4 windows x86 arch:x86
9d6c9747063686bc04bdf3f1c2f7b71b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
core
?DeleteMe@ReferenceMaker@@QAEXXZ
??1ModContext@@QAE@XZ
?idTM@@3VIdentityTM@@A
?CreateInstance@@YAPAXKVClass_ID@@@Z
??0ModContext@@QAE@XZ
?CreateDerivedObject@@YAPAVIDerivedObject@@PAVObject@@@Z
?derivObjClassID@@3VClass_ID@@A
?CreateWSDerivedObject@@YAPAVIDerivedObject@@PAVObject@@@Z
?WSMDerivObjClassID@@3VClass_ID@@A
maxutil
??1CStr@@QAE@XZ
?data@CStr@@QAEPADXZ
??4CStr@@QAEAAV0@PBD@Z
??0CStr@@QAE@XZ
kernel32
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
LocalFree
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
GetCurrentThreadId
RaiseException
DeleteCriticalSection
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
GetCurrentProcessId
InterlockedDecrement
lstrlenA
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedIncrement
user32
MessageBoxA
LoadStringA
UnregisterClassA
ole32
CoCreateInstance
oleaut32
VariantChangeType
VariantClear
VariantInit
CreateErrorInfo
SetErrorInfo
SysAllocString
SysFreeString
VariantCopy
atl80
ord22
ord15
ord61
ord23
ord49
ord32
ord64
ord18
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@ABV01@@Z
??$?8_WU?$char_traits@_W@std@@V?$allocator@_W@1@@std@@YA_NABV?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@0@0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcr80
_decode_pointer
?terminate@@YAXXZ
_malloc_crt
_encoded_null
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_strdup
_except_handler4_common
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__clean_type_info_names_internal
_crt_debugger_hook
_onexit
??3@YAXPAX@Z
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
__CxxFrameHandler3
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@XZ
_CxxThrowException
??0exception@std@@QAE@ABV01@@Z
??2@YAPAXI@Z
free
_except_handler3
malloc
_resetstkoflw
_purecall
setlocale
_snwprintf
swscanf
memset
_unlock
_encode_pointer
__dllonexit
_lock
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ