d:\develope\ClipView(AffliateProgram)\VS2005환경\제휴프로그램관리#A\InstallerA\Release\InstallerA.pdb
Static task
static1
Behavioral task
behavioral1
Sample
6502bdf7a238e624c7d41a9c87b007c8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6502bdf7a238e624c7d41a9c87b007c8_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6502bdf7a238e624c7d41a9c87b007c8_JaffaCakes118
-
Size
1.2MB
-
MD5
6502bdf7a238e624c7d41a9c87b007c8
-
SHA1
a27028af3661337c8e87d66a731c17ae8240df07
-
SHA256
2de72a23dbde50afcf91a8134ab85d6fcf5e6d6f83ed5096aca70154bfd34d4a
-
SHA512
7cafd9ebb36253ad1d34e9684a1ca79a4a970bd2eec5fe8f40cb78c0915989e48c0f457b1f573138690a3fa6c982e23e1bcc2f5e63e12ab203ae8d21112320c4
-
SSDEEP
24576:WnYzE0fmVwSZU6IjLyl6LD1MN76gqMRPy4:8+E0f4GiwJxbEy4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6502bdf7a238e624c7d41a9c87b007c8_JaffaCakes118
Files
-
6502bdf7a238e624c7d41a9c87b007c8_JaffaCakes118.exe windows:4 windows x86 arch:x86
e5c7a35fdf4aa6c053f3201f679e945b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
RtlUnwind
RaiseException
ExitProcess
ExitThread
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
LocalAlloc
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
Sleep
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
GetDriveTypeA
SetEnvironmentVariableA
GlobalFlags
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrlenA
SuspendThread
ResumeThread
SetThreadPriority
WritePrivateProfileStringW
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetCurrentProcessId
InterlockedDecrement
GetFileTime
GetFullPathNameW
GetVolumeInformationW
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetModuleHandleA
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
GetThreadLocale
InterlockedIncrement
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
FreeLibrary
CompareStringW
LoadLibraryA
lstrcmpW
GetProcAddress
GetVersionExA
GlobalAlloc
LocalFree
MulDiv
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
LocalFileTimeToFileTime
GetCurrentDirectoryW
SetFileTime
SystemTimeToFileTime
SetLastError
HeapAlloc
ReadFile
GetFileSize
CreateFileA
FormatMessageW
GetProcessHeap
GetModuleHandleW
HeapFree
GetLastError
GetExitCodeProcess
CreateProcessW
CreateThread
ExpandEnvironmentStringsW
CreateEventW
GetTickCount
SetEvent
WaitForSingleObject
SetFileAttributesW
lstrcpyW
DeleteFileW
CloseHandle
CreateFileW
GetModuleFileNameW
GetFileAttributesW
WriteFile
CreateDirectoryW
SetFilePointer
LockResource
lstrlenW
MultiByteToWideChar
SizeofResource
WideCharToMultiByte
LoadResource
GetStartupInfoA
FindResourceW
user32
PostThreadMessageW
CopyAcceleratorTableW
LoadCursorW
GetSysColorBrush
GetMessageW
TranslateMessage
ValidateRect
SetWindowContextHelpId
MapDialogRect
SetCursor
PostQuitMessage
GetWindowThreadProcessId
GetCursorPos
WindowFromPoint
DestroyMenu
CharUpperW
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
CharNextW
ShowWindow
MoveWindow
IsDialogMessageW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageW
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetWindowTextLengthW
GetWindowTextW
RegisterClipboardFormatW
MessageBeep
GetNextDlgGroupItem
UnregisterClassW
GetWindow
SetFocus
ReleaseCapture
SetCapture
InvalidateRgn
SetRect
GetForegroundWindow
IsRectEmpty
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
GetMenuState
EnableMenuItem
CheckMenuItem
wsprintfW
DrawTextW
TabbedTextOutW
DrawTextExW
GrayStringW
IsWindow
PtInRect
GetDC
GetWindowLongW
ReleaseDC
SetWindowLongW
GetSysColor
CopyRect
GetParent
InvalidateRect
GetSystemMenu
IsIconic
LoadImageW
DrawIcon
GetClientRect
LoadIconW
AppendMenuW
GetSystemMetrics
SendMessageW
SetWindowTextW
EnableWindow
UnregisterClassA
gdi32
ExtSelectClipRgn
DeleteDC
ScaleWindowExtEx
GetMapMode
GetRgnBox
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetWindowExtEx
GetViewportExtEx
GetObjectW
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateRectRgnIndirect
GetTextColor
GetBkColor
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateBitmap
BitBlt
ExtTextOutW
PtVisible
Escape
RectVisible
TextOutW
SelectObject
GetStockObject
DeleteObject
CreateCompatibleDC
msimg32
TransparentBlt
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegCloseKey
RegSetValueW
RegCreateKeyExW
RegEnumKeyW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyW
RegDeleteValueW
RegQueryValueW
RegDeleteKeyW
RegOpenKeyW
RegQueryValueExW
shell32
SHBrowseForFolderW
SHGetMalloc
SHGetPathFromIDListW
ShellExecuteW
SHGetDesktopFolder
SHGetSpecialFolderPathW
comctl32
_TrackMouseEvent
InitCommonControlsEx
shlwapi
PathIsUNCW
PathFindExtensionW
PathStripToRootW
PathFindFileNameW
oledlg
OleUIBusyW
ole32
CLSIDFromProgID
CoTaskMemFree
CoCreateGuid
CoCreateInstance
CLSIDFromString
CoTaskMemAlloc
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
OleCreateFontIndirect
VariantChangeType
VariantClear
SysAllocStringLen
SysStringLen
SysFreeString
VariantInit
SysAllocString
urlmon
URLDownloadToFileW
wininet
HttpOpenRequestA
HttpQueryInfoW
InternetSetOptionW
HttpSendRequestW
InternetConnectW
InternetReadFile
InternetOpenW
InternetCloseHandle
HttpAddRequestHeadersA
Sections
.text Size: 384KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 272KB - Virtual size: 269KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ