f:\작업중\코드클린\소스\2009년\111900_changeTB\CodeClean\CCIntro\Release\CCIntro.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6111d4f5995deb12e1b7a6887afffd31_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6111d4f5995deb12e1b7a6887afffd31_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6111d4f5995deb12e1b7a6887afffd31_JaffaCakes118
-
Size
76KB
-
MD5
6111d4f5995deb12e1b7a6887afffd31
-
SHA1
fa4b52c126a16aaf98eedc351b90114c0463f631
-
SHA256
45acd1c74b0f07df7ad3081787955eb0089c12c2ac85f6d0ec56af6976171550
-
SHA512
a4b68901e110fe9f23a6e2f7b384c47fdca3f7242e0b4f590da6d91b2c09eb0127f623294c2678055b99d43b5d3a73d7d17409c0a9560a1f04ca2d66010f1ba8
-
SSDEEP
768:T3ntwWazyCf1LnN+L5NZxtKJ+AKSHzLnuo4FEHvRVX8Uvt36qvbTNS0ec84//9rm:rtQ1LSlALfXvRVX8Uvt3fNS0ecZniN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6111d4f5995deb12e1b7a6887afffd31_JaffaCakes118
Files
-
6111d4f5995deb12e1b7a6887afffd31_JaffaCakes118.exe windows:4 windows x86 arch:x86
f6926d2355d6b87a2b551a62d085f248
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
InternetSetStatusCallback
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
mfc71
ord2288
ord2280
ord911
ord5563
ord386
ord745
ord557
ord5491
ord5975
ord3830
ord6006
ord3931
ord2131
ord907
ord5403
ord722
ord755
ord530
ord564
ord6007
ord1207
ord5716
ord1123
ord2751
ord631
ord1084
ord5715
ord1185
ord1482
ord6118
ord2933
ord299
ord1489
ord762
ord304
ord781
ord5529
ord4108
ord4109
ord876
ord2468
ord764
ord2322
ord2902
ord297
ord1187
ord1191
ord566
ord310
ord784
ord757
ord578
ord3333
ord4261
ord4481
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3683
ord4541
ord912
ord5717
msvcr71
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
__security_error_handler
memset
calloc
fseek
ftell
fread
__set_app_type
strstr
fopen
fwrite
fclose
atol
_makepath
strrchr
_strdup
_except_handler3
_controlfp
_stricmp
_strupr
_setmbcp
__CxxFrameHandler
free
malloc
_splitpath
_close
_filelength
_open
_mkdir
rename
kernel32
Sleep
WinExec
GetSystemDirectoryA
GetModuleFileNameA
lstrcmpiA
GetFullPathNameA
CreateDirectoryA
GetFileAttributesA
CloseHandle
SetFileTime
GetProcAddress
DosDateTimeToFileTime
GetFileTime
RemoveDirectoryA
GetVersionExA
WriteFile
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
InitializeCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
InterlockedExchange
GetACP
GetLocaleInfoA
CreateFileA
GetThreadLocale
FreeLibrary
LoadLibraryA
CopyFileA
GetLastError
MultiByteToWideChar
LocalFileTimeToFileTime
DeleteFileA
lstrlenA
user32
PostMessageA
wsprintfA
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
RegFlushKey
RegCloseKey
shell32
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
ole32
CoInitialize
CoCreateInstance
CoUninitialize
ws2_32
gethostbyname
gethostname
inet_ntoa
WSAGetLastError
WSAStartup
iphlpapi
GetAdaptersInfo
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ