RtplDtpmimr67
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e251df3a6844406437bd9bb80a3d1ac89e5e58688f1afc613ec4d0a397f69b71.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_e251df3a6844406437bd9bb80a3d1ac89e5e58688f1afc613ec4d0a397f69b71
-
Size
159KB
-
MD5
237c10611d4c09060606990084e2dada
-
SHA1
3d5906fdf8c989961f1e78c25dea6462bd33ec6f
-
SHA256
e251df3a6844406437bd9bb80a3d1ac89e5e58688f1afc613ec4d0a397f69b71
-
SHA512
0c830cbf76a57e7a7eba9017f20d238ad255db20f97ff797bd108bfebf1dda0c11196729a2c95b34932d457afa14b706bf32c1ffc6237f53a57fad4568e84a9b
-
SSDEEP
3072:9M8CMtKJlXoDFwXrdV/9/uWIdojDZl4epTGmoAc7iTRilfn6wlYYRZwd:pnClX8WZ7/HrRCADTR0VlDZw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_e251df3a6844406437bd9bb80a3d1ac89e5e58688f1afc613ec4d0a397f69b71
Files
-
JaffaCakes118_e251df3a6844406437bd9bb80a3d1ac89e5e58688f1afc613ec4d0a397f69b71.dll windows:5 windows x86 arch:x86
9e8b617b10ada8d5a1fd6f30540a87c8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ole32
CreateStreamOnHGlobal
CreatePointerMoniker
advapi32
RegOverridePredefKey
kernel32
OutputDebugStringA
OpenSemaphoreW
GetProfileSectionW
LoadLibraryW
GetProfileSectionA
GetModuleHandleW
CloseHandle
LoadLibraryExW
clusapi
ClusterEnum
opengl32
glTexSubImage1D
user32
TranslateMessage
rasapi32
RasGetConnectionStatistics
Exports
Exports
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1018B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 556B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ