d:\2014년 프로젝트\토스트\7.kcn\criteo\MainOpen\Release\Criteo_adble.pdb
Static task
static1
Behavioral task
behavioral1
Sample
23167e80565a327e15a2692dec21a739_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
23167e80565a327e15a2692dec21a739_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
23167e80565a327e15a2692dec21a739_JaffaCakes118
-
Size
300KB
-
MD5
23167e80565a327e15a2692dec21a739
-
SHA1
58d24fb4438698e809ccbfbc3436dedade6ea690
-
SHA256
1bcbe84bd4bc69c5d5524ca3b3c999855c6f66a56e85a8bcdf496d52acf731ae
-
SHA512
f80e22815348f1e5568334dea8aaab49c1105142604372a3fa39c9a1a7fbe54fb30dde8b2ec9e7ee99958eec4007950d42f4ee1f7ef93c5d10bfe8d7bc5f5a67
-
SSDEEP
6144:axNT5npwsxR7qe4lsxQKcnq6O0oWQU6WKuUCM:arT5npwsxRWeY4Q1q7UfKZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23167e80565a327e15a2692dec21a739_JaffaCakes118
Files
-
23167e80565a327e15a2692dec21a739_JaffaCakes118.exe windows:4 windows x86 arch:x86
462b51795fea318e66d52f9a038a5d0e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCloseHandle
HttpQueryInfoA
InternetOpenUrlA
InternetReadFile
InternetOpenA
InternetQueryDataAvailable
kernel32
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
TerminateProcess
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
HeapDestroy
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
GetTickCount
SetErrorMode
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetFullPathNameA
GetFileTime
GetFileAttributesA
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GlobalFree
GlobalAlloc
FormatMessageA
LocalFree
FreeResource
GetCurrentThreadId
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
MulDiv
GetProcAddress
SetLastError
InterlockedDecrement
GlobalLock
GlobalUnlock
lstrcpynA
GlobalGetAtomNameA
GlobalAddAtomA
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
MultiByteToWideChar
GetModuleHandleA
GetModuleFileNameA
SetCurrentDirectoryA
DeleteFileA
GetTempPathA
GetLocalTime
WideCharToMultiByte
Sleep
FindResourceA
LoadResource
LockResource
SizeofResource
ReleaseMutex
CreateMutexA
GetLastError
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateFileA
WriteFile
CloseHandle
HeapCreate
user32
CharNextA
SetRect
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
PostThreadMessageA
GetMenuItemInfoA
InflateRect
SetWindowContextHelpId
MapDialogRect
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
ValidateRect
ShowOwnedPopups
PostQuitMessage
GetCursorPos
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
MoveWindow
SetWindowTextA
IsDialogMessageA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetWindowTextLengthA
GetWindowTextA
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
MessageBoxA
TrackPopupMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
ShowScrollBar
DeferWindowPos
GetScrollInfo
SetScrollInfo
RegisterClassA
UnregisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
PtInRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
UnhookWindowsHookEx
RegisterWindowMessageA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
DestroyMenu
GetSysColor
WinHelpA
GetActiveWindow
EqualRect
GetDlgItem
SetWindowLongA
GetKeyState
GetMenu
PeekMessageA
GetCapture
ReleaseCapture
LoadAcceleratorsA
SetActiveWindow
IsWindowVisible
InsertMenuItemA
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
IntersectRect
OffsetRect
SetRectEmpty
CopyRect
GetLastActivePopup
BringWindowToTop
PostMessageA
SetMenu
ShowWindow
GetWindowLongA
IsWindow
GetDesktopWindow
GetWindow
IsWindowEnabled
TranslateAcceleratorA
GetDlgCtrlID
GetFocus
IsChild
UpdateWindow
AdjustWindowRectEx
CharUpperA
FindWindowA
GetForegroundWindow
GetClassNameA
SetWindowPos
SetFocus
GetSystemMetrics
AnimateWindow
GetSysColorBrush
LoadCursorA
SetCapture
SetWindowRgn
SetForegroundWindow
IsRectEmpty
LoadIconA
KillTimer
SetTimer
GetClientRect
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
GetClassInfoA
SendMessageA
GetParent
InvalidateRect
ReleaseDC
GetDC
GetWindowRect
SetCursor
EnableWindow
LoadBitmapA
wsprintfA
gdi32
CreateSolidBrush
SetViewportOrgEx
CreateFontIndirectA
GetTextExtentPoint32A
CreateEllipticRgn
LPtoDP
Ellipse
CreateRectRgnIndirect
GetMapMode
GetDeviceCaps
GetBkColor
GetTextColor
GetRgnBox
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
GetWindowExtEx
GetViewportExtEx
GetStockObject
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
RestoreDC
SaveDC
BitBlt
CreateCompatibleDC
GetObjectA
CreateCompatibleBitmap
CreateBitmap
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
OffsetViewportOrgEx
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoTaskMemAlloc
CoFreeUnusedLibraries
CLSIDFromProgID
CoTaskMemFree
OleUninitialize
CLSIDFromString
CreateStreamOnHGlobal
CoGetClassObject
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
oleaut32
VariantInit
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocString
SafeArrayDestroy
SystemTimeToVariantTime
VariantTimeToSystemTime
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantChangeType
VariantClear
Sections
.text Size: 192KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ