d:\김민정\프로그램\업데이트모듈\동의창\Sms\Sms1000\소스\메인\업데이터\smsmupdater_1.0.0.7\Release\VersionChecker.pdb
Static task
static1
Behavioral task
behavioral1
Sample
000459858d616ac0572ff9fb4cdbd1df_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
000459858d616ac0572ff9fb4cdbd1df_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
000459858d616ac0572ff9fb4cdbd1df_JaffaCakes118
-
Size
416KB
-
MD5
000459858d616ac0572ff9fb4cdbd1df
-
SHA1
db2253f7cf332e55a6b40c0f3b31568deeda0308
-
SHA256
1b0a692b2669b6c7479fe4cdf42b8182db79c041be6e32437ac0c3b9531f28ef
-
SHA512
dc95966da52dc4b2ef60cdac9169e502fff3ddbe4840bb4377461043cd3cc2d01c1f430ef3187ee546e9ea4a2758fb1a43d0544be1bfcc017757c1eb34dc9af4
-
SSDEEP
6144:bo8Gv/HZoWIiUZ9XLOWhr1zCkQzlS1aI0y1plVtWPEgvv4aR8DuL4C:btG3ZoLhZ9Ss1zgzNC1plVeRXReuL4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 000459858d616ac0572ff9fb4cdbd1df_JaffaCakes118
Files
-
000459858d616ac0572ff9fb4cdbd1df_JaffaCakes118.exe windows:4 windows x86 arch:x86
f25df865f428ce2f157e67775c22e147
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
UnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
LCMapStringA
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetSystemTimeAsFileTime
ResetEvent
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
CreateThread
ExitThread
RtlUnwind
ExitProcess
WritePrivateProfileStringA
SetErrorMode
GetOEMCP
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GetFileTime
GetFileAttributesA
RaiseException
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
FormatMessageA
LocalFree
GetModuleFileNameA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
InterlockedDecrement
SetLastError
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
GetCurrentProcess
Process32First
Process32Next
GetExitCodeProcess
CreateToolhelp32Snapshot
Module32First
Module32Next
OpenProcess
TerminateProcess
GetSystemDirectoryA
GetWindowsDirectoryA
CreateFileA
WriteFile
GetTickCount
OutputDebugStringA
GlobalReAlloc
GetCPInfo
DeleteFileA
WinExec
Sleep
CreateMutexA
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
FindResourceA
LoadResource
SizeofResource
FreeResource
LockResource
GlobalLock
GlobalUnlock
MulDiv
GlobalFree
CreateEventA
ResumeThread
GlobalAlloc
SetEvent
WaitForSingleObject
CloseHandle
LCMapStringW
user32
SetCapture
RegisterClipboardFormatA
SetRectEmpty
CharNextA
DestroyMenu
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
CreateDialogIndirectParamA
EndDialog
GetMenuStringA
wsprintfA
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
EndPaint
BeginPaint
GetWindowDC
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
IsChild
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetDlgItem
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
IsRectEmpty
TrackPopupMenu
GetKeyState
UpdateWindow
GetMenu
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
PtInRect
GetWindow
ReleaseCapture
SetWindowRgn
LoadImageA
PostMessageA
DestroyCursor
WindowFromPoint
GetParent
GetNextDlgTabItem
GetActiveWindow
ClientToScreen
FrameRect
OffsetRect
InflateRect
DrawStateA
IsMenu
GetMenuItemInfoA
GetSysColorBrush
SystemParametersInfoA
DrawIconEx
DestroyIcon
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
CopyAcceleratorTableA
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
SetParent
ModifyMenuA
GetSubMenu
GetMenuState
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
CreateMenu
DrawEdge
LoadBitmapA
BringWindowToTop
SetForegroundWindow
SetActiveWindow
SetWindowPos
LoadCursorA
SetCursor
FindWindowA
PostThreadMessageA
LockWindowUpdate
GetDCEx
MessageBoxA
GetWindowRect
KillTimer
SetTimer
IsWindowVisible
GetWindowLongA
SetWindowLongA
GetSystemMetrics
LoadIconA
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
PostQuitMessage
CharUpperA
SetRect
EnableWindow
InvalidateRect
CopyRect
GetDC
ReleaseDC
GetSysColor
FillRect
GetTopWindow
gdi32
CreatePatternBrush
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetCharWidthA
CreateFontA
SetRectRgn
GetMapMode
GetRgnBox
RestoreDC
SaveDC
GetClipBox
ExtCreateRegion
CombineRgn
StretchDIBits
CreateBitmap
SetBkColor
SetTextColor
ExtSelectClipRgn
SetBkMode
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
BitBlt
GetStockObject
CreateDIBSection
GetTextExtentPoint32W
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetTextExtentPoint32A
SetPixel
GetPixel
PatBlt
Ellipse
GetBkMode
GetObjectA
CreateFontIndirectA
CreatePen
GetDeviceCaps
CreateSolidBrush
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCloseKey
shell32
SHGetSpecialFolderLocation
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
SHGetPathFromIDListA
comctl32
ord17
ImageList_GetImageCount
ImageList_AddMasked
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_Draw
_TrackMouseEvent
ImageList_Destroy
ImageList_Create
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
SHDeleteValueA
UrlUnescapeA
oledlg
ord8
ole32
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CreateStreamOnHGlobal
CreateILockBytesOnHGlobal
oleaut32
OleLoadPicture
SysAllocString
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantInit
VariantClear
VariantChangeType
wininet
InternetQueryDataAvailable
InternetReadFile
InternetOpenUrlA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
HttpQueryInfoA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetErrorDlg
HttpSendRequestA
InternetCloseHandle
gdiplus
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDisposeImage
GdipAlloc
GdipFree
GdiplusShutdown
GdipCloneImage
GdiplusStartup
iphlpapi
GetAdaptersInfo
winmm
PlaySoundA
Sections
.text Size: 260KB - Virtual size: 257KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ