d:\김민정\프로그램\업데이트모듈\동의창\Feel2Day\소스\신규\인스톨\HIDE nfdins.exe\nfdins.exe_1.0.0.3\Release\SantaSetup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
4321f908537f692c23161233a6e20eba_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4321f908537f692c23161233a6e20eba_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4321f908537f692c23161233a6e20eba_JaffaCakes118
-
Size
308KB
-
MD5
4321f908537f692c23161233a6e20eba
-
SHA1
638d9d371f591dd5c27c018bab43b9e60309708d
-
SHA256
c1e03082963467f518608c957a4cdaf3979db2ecea8958719195aed0d92ccdb2
-
SHA512
1b06ce95df5d4f6d49b47abd3179f0ad0e75a95c7fde05d037bd97fa89731ee8ac0da3299e22485353141908268d9c7b25c252da5405b920fca8e6092ea05846
-
SSDEEP
6144:dbDxuU/x0yVothgOlO96N3/cONB7JWg4vmsU58/RiMIm:d5j/x0qZOlO96NPc6UlU58J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4321f908537f692c23161233a6e20eba_JaffaCakes118
Files
-
4321f908537f692c23161233a6e20eba_JaffaCakes118.exe windows:4 windows x86 arch:x86
db3ab0b402f51381f9995f5f834e1e1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetCloseHandle
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetErrorDlg
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCrackUrlA
InternetOpenUrlA
kernel32
ExitProcess
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
SetErrorMode
GetOEMCP
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
InterlockedIncrement
WritePrivateProfileStringA
GetFileTime
RaiseException
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
InterlockedDecrement
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
FindFirstFileA
FileTimeToLocalFileTime
FindNextFileA
FindClose
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcatA
lstrcmpW
SetLastError
FormatMessageA
lstrcpynA
LocalFree
GlobalUnlock
GlobalFree
GetCurrentThreadId
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
ConvertDefaultLocale
EnumResourceLanguagesA
FreeLibrary
LoadLibraryA
GetProcAddress
MulDiv
OutputDebugStringA
FreeResource
GetCPInfo
GetTickCount
GetFileSize
FileTimeToSystemTime
GetFileAttributesA
ReadFile
SetFilePointer
GetCurrentDirectoryA
Process32First
Process32Next
GetExitCodeProcess
CreateToolhelp32Snapshot
Module32First
Module32Next
OpenProcess
TerminateProcess
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
MultiByteToWideChar
Sleep
CreateFileA
GetModuleFileNameA
lstrcpyA
lstrlenA
WriteFile
CloseHandle
GetCurrentThread
GetCurrentProcess
CreateMutexA
GetLastError
CreateDirectoryA
DeleteFileA
SetCurrentDirectoryA
WinExec
WaitForSingleObject
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetUnhandledExceptionFilter
user32
ReleaseCapture
EndPaint
BeginPaint
GetWindowDC
DestroyMenu
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
UpdateWindow
GetMenu
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
PtInRect
GetWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
EndDialog
IsWindowVisible
EqualRect
LoadCursorA
IsWindow
IsRectEmpty
SetWindowPos
SetActiveWindow
PostMessageA
SetCursor
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
GetWindowRect
OffsetRect
GetSysColorBrush
SystemParametersInfoA
GetSysColor
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
ModifyMenuA
GetSubMenu
GetMenuState
GetMenuItemID
GetMenuItemCount
LoadBitmapA
CopyRect
SetRect
GetDesktopWindow
CharUpperA
CharNextA
SetCapture
GetWindowLongA
SetWindowLongA
GetSystemMetrics
LoadIconA
EnableWindow
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
wsprintfA
PostQuitMessage
SetForegroundWindow
FindWindowA
AdjustWindowRectEx
MoveWindow
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetBkColor
CreateRectRgnIndirect
GetMapMode
GetTextColor
GetRgnBox
CreateBitmap
SetBkColor
SetTextColor
GetStockObject
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
GetClipBox
GetDeviceCaps
GetObjectA
SelectObject
DeleteObject
DeleteDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
AdjustTokenPrivileges
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
UrlUnescapeA
oledlg
ord8
ole32
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRevokeClassObject
CoTaskMemAlloc
CoGetClassObject
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromString
CLSIDFromProgID
oleaut32
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantChangeType
SysAllocString
VariantClear
VariantInit
SafeArrayDestroy
SystemTimeToVariantTime
OleCreateFontIndirect
VariantCopy
iphlpapi
GetAdaptersInfo
Sections
.text Size: 192KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ