C:\DOCUME~1\sebldsa\LOCALS~1\Temp\Dpolarisqfe\optPolarisQFE\baseline\WMPEFFECTS.pdb
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_638df5bdb980f05e78d8b9023f2ae62a.dll
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_638df5bdb980f05e78d8b9023f2ae62a
-
Size
389KB
-
MD5
638df5bdb980f05e78d8b9023f2ae62a
-
SHA1
cf8b2877e9946e9060eb1c537a4c9cd2fc0ef689
-
SHA256
d3365d372002ede0c6f5e605c9ed858a5d54aac4390a985907f5c38879173782
-
SHA512
cda2786db283da446ac09d0b67fd0d0af7ffe32b244ea4c7c439d708d6b4582d44154fb9205463f941a5a2c62c13c83a8165811500c6e844e9898db9cc039682
-
SSDEEP
6144:iXG3mkxzuLF70SA/rHMWmc3RSaylw9L+FisCN92OM+KahmqTk:eaNg1LyLmc3kNxo2eHhmqY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_638df5bdb980f05e78d8b9023f2ae62a
Files
-
JaffaCakes118_638df5bdb980f05e78d8b9023f2ae62a.dll regsvr32 windows:6 windows x86 arch:x86
66677056105374d7addcd51064b45753
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
_vsnwprintf
realloc
malloc
_purecall
??2@YAPAXI@Z
memcpy
memset
??_U@YAPAXI@Z
free
??_V@YAXPAX@Z
atol
_adjust_fdiv
_unlock
??3@YAXPAX@Z
__dllonexit
_lock
_onexit
_wcsicmp
_amsg_exit
_initterm
_XcptFilter
_errno
_CIacos
_CIpow
memmove
_CIcos
_CIsin
_CIsqrt
floor
ceil
rand
wcspbrk
wcschr
ntdll
RtlUnwind
kernel32
LocalAlloc
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetFileSize
ExpandEnvironmentStringsW
LocalFree
lstrcpyW
GetLastError
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
lstrlenW
GetModuleFileNameW
FreeLibrary
GetProcAddress
LoadLibraryW
DisableThreadLibraryCalls
GetVersionExW
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
MultiByteToWideChar
lstrcmpiW
lstrcpynW
lstrcatW
lstrlenA
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
LoadLibraryA
InterlockedCompareExchange
InterlockedExchange
Sleep
OutputDebugStringA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
WaitForSingleObject
ReleaseMutex
CreateMutexW
CloseHandle
DebugBreak
CreateFileW
GetVersion
SetLastError
advapi32
TraceMessage
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
TraceEvent
RegEnumKeyExW
RegEnumValueW
RegSetValueExW
user32
RegisterWindowMessageA
CharNextW
CharPrevW
PostMessageW
ole32
StringFromGUID2
CoTaskMemFree
CoGetTreatAsClass
CoCreateFreeThreadedMarshaler
CoTaskMemRealloc
CoTaskMemAlloc
PropVariantCopy
CoCreateInstance
PropVariantClear
StringFromCLSID
oleaut32
RegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
VarUI4FromStr
SysAllocStringLen
VariantInit
VariantClear
SysFreeString
msdmo
MoInitMediaType
MoFreeMediaType
DMOUnregister
MoCopyMediaType
wintrust
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminAcquireContext
mfplat
MFHeapFree
MFHeapAlloc
MFDeserializeAttributesFromStream
MFSerializeAttributesToStream
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 230KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
RT_CODE Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RT_DATA Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE