d:\Project\PCScan 관련\Release\AntiGuard.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0800c886294194e1b8454621cb5b921d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0800c886294194e1b8454621cb5b921d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0800c886294194e1b8454621cb5b921d_JaffaCakes118
-
Size
5.9MB
-
MD5
0800c886294194e1b8454621cb5b921d
-
SHA1
bcb5e5e9bec695c36061a743e53a14662466128f
-
SHA256
cc2324f306ff1f7a2a636d534234877dffdeee2b70a6adea3680f7d5c57979a3
-
SHA512
3d30ee08dd2ad06251c322bc50cf009ecdf5d09d83b2bff9f7bcc0597cc8a19222475786f57d447ab85d9da275b1de24d76ab71581ea72f5034d9d2a9fc810fb
-
SSDEEP
12288:cCWed6MJaeXkg/cU7JyBjMoetxPg83LqhsBmPxDl9OtMVDmbiwIWSlup:cCWe50MF3LCsKhTOtMVDmbiwIWj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0800c886294194e1b8454621cb5b921d_JaffaCakes118
Files
-
0800c886294194e1b8454621cb5b921d_JaffaCakes118.exe windows:5 windows x86 arch:x86
0215c43f92d94fe6c400623bcd23a025
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
LCMapStringA
GetConsoleCP
GetConsoleMode
VirtualAlloc
VirtualQuery
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetCurrentDirectoryA
GetDriveTypeA
GetProcessHeap
SetEnvironmentVariableA
VirtualProtect
lstrlenW
HeapSize
ExitProcess
InitializeCriticalSectionAndSpinCount
GetSystemInfo
ExitThread
RaiseException
RtlUnwind
HeapReAlloc
HeapAlloc
HeapFree
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
GetTickCount
GetFileTime
GetFileSizeEx
SetErrorMode
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
ReadFile
MoveFileW
CreateEventW
SuspendThread
SetEvent
SetThreadPriority
GetThreadLocale
FormatMessageW
GetCurrentProcessId
MulDiv
GetModuleHandleA
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
GetVersionExA
GetNumberFormatW
GetVersionExW
CreateThread
GetModuleHandleW
SetLastError
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
WritePrivateProfileStringW
OpenProcess
FreeLibrary
lstrcmpA
lstrcpynW
lstrcpyW
GetProcAddress
LoadLibraryW
LocalFree
GetVersion
WideCharToMultiByte
GetDriveTypeW
GetLogicalDriveStringsW
FreeResource
lstrlenA
CreateMutexW
GetModuleFileNameW
FindClose
FindNextFileW
SetFileAttributesW
GetFileAttributesW
FindFirstFileW
CloseHandle
WriteFile
SetFilePointer
GetFileSize
CreateFileW
GetSystemDirectoryW
GetLongPathNameW
GetTempPathW
ExpandEnvironmentStringsW
MultiByteToWideChar
DeleteFileW
RemoveDirectoryW
WaitForSingleObject
ResumeThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
Sleep
FindResourceW
LoadResource
LockResource
SizeofResource
GetLastError
lstrcmpW
FileTimeToLocalFileTime
FileTimeToSystemTime
GetTimeZoneInformation
user32
UnregisterClassW
SetCapture
InvalidateRgn
CopyAcceleratorTableW
SetRect
GetSysColorBrush
DestroyMenu
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
CharUpperW
GetMessageW
TranslateMessage
ValidateRect
GetDesktopWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
CharNextW
BeginPaint
GetWindowDC
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
GetWindowTextLengthW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
EnableWindow
GetSysColor
KillTimer
InvalidateRect
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SetWindowPos
IntersectRect
SystemParametersInfoA
GetNextDlgGroupItem
ReleaseCapture
ClientToScreen
ReleaseDC
DrawFocusRect
WindowFromPoint
GetCapture
SetWindowLongW
LockWindowUpdate
wsprintfA
IsCharAlphaNumericW
MessageBeep
RegisterClipboardFormatW
GetMenuItemID
TrackPopupMenu
GetCursorPos
PostThreadMessageW
SetFocus
SetTimer
PostMessageW
GetWindowRect
RedrawWindow
GetParent
UpdateWindow
GetClientRect
FillRect
OffsetRect
SetCursor
SendMessageW
IsWindow
GetDC
FindWindowW
EnumWindows
GetWindowThreadProcessId
IsWindowVisible
GetWindowPlacement
GetWindowTextW
SetParent
wsprintfW
CopyRect
SetForegroundWindow
DefDlgProcW
LoadCursorW
GetClassInfoW
LoadIconW
IsIconic
GetSystemMetrics
DrawIcon
GetWindowLongW
GetWindow
PtInRect
GetActiveWindow
FrameRect
InflateRect
IsRectEmpty
LoadImageW
DrawEdge
SetMenuDefaultItem
GetSubMenu
LoadMenuW
LoadBitmapW
GrayStringW
DrawTextExW
TabbedTextOutW
DrawTextW
EndPaint
gdi32
GetRgnBox
CreateRectRgnIndirect
GetTextColor
GetDeviceCaps
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetTextAlign
SetMapMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
StretchBlt
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteDC
GetBkColor
DPtoLP
GetViewportExtEx
GetWindowExtEx
GetMapMode
LPtoDP
SelectObject
SetBkMode
CreatePen
Rectangle
GetStockObject
BitBlt
SetViewportOrgEx
GetViewportOrgEx
GetObjectW
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectW
CreateSolidBrush
DeleteObject
comdlg32
GetFileTitleW
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegSetKeySecurity
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptGetHashParam
RegQueryValueW
RegEnumKeyW
RegOpenKeyW
RegSetValueExW
RegEnumValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteValueW
RegDeleteKeyW
RegFlushKey
RegCreateKeyExW
FreeSid
CryptDestroyHash
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegOpenKeyExW
RegCloseKey
RegDeleteValueA
RegEnumValueA
RegOpenKeyExA
CryptReleaseContext
shell32
SHGetSpecialFolderPathW
Shell_NotifyIconW
SHGetFileInfoW
ShellExecuteW
comctl32
InitCommonControlsEx
_TrackMouseEvent
shlwapi
StrCmpW
StrStrW
PathStripToRootW
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
StrCpyW
oledlg
OleUIBusyW
ole32
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoInitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
OleUninitialize
oleaut32
SysAllocString
SysAllocStringByteLen
SysStringLen
SysFreeString
VarDateFromStr
VariantInit
SysAllocStringLen
VariantClear
VariantChangeType
OleCreateFontIndirect
SystemTimeToVariantTime
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
GetErrorInfo
netapi32
Netbios
iphlpapi
GetAdaptersInfo
crypt32
CryptUnprotectData
wininet
InternetGetConnectedState
FindNextUrlCacheEntryW
FindCloseUrlCache
DeleteUrlCacheEntryW
FindFirstUrlCacheEntryW
ws2_32
recv
send
closesocket
__WSAFDIsSet
select
connect
htons
socket
WSACleanup
gethostbyname
WSAStartup
ioctlsocket
Sections
.text Size: 468KB - Virtual size: 468KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ