d:\김민정\프로그램\악성코드\pc-spider.co.kr\source\upmo\upapp1.0.0.1\Release\HiSantaNotifier.pdb
Static task
static1
Behavioral task
behavioral1
Sample
647da78556d960eebc1d60affbe27485_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
647da78556d960eebc1d60affbe27485_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
647da78556d960eebc1d60affbe27485_JaffaCakes118
-
Size
488KB
-
MD5
647da78556d960eebc1d60affbe27485
-
SHA1
289ec22202cf3f0ecd6f36c6d74f9e96b9eb2142
-
SHA256
17f54c43e1335cba92eb902fad72ce251358d645dcad892d7cea15f18ecd6486
-
SHA512
874c8e8f47d2a27fcc7c5250af0451504f92ac424f556e9991257c837e1b3b973502fb46fc363aa7c189f2b4c50bb6221b0bc29499b0c95317e9c9e3e652cffb
-
SSDEEP
6144:roLHnju90yLXVrnjUmhfi8W7LfwJ2N/kLydz2jd9Po:r2juGybVnomhfw7UJCkLyd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 647da78556d960eebc1d60affbe27485_JaffaCakes118
Files
-
647da78556d960eebc1d60affbe27485_JaffaCakes118.exe windows:4 windows x86 arch:x86
2238e338ae21948c8bf58b4549c98a17
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetReadFile
InternetOpenUrlA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
InternetQueryDataAvailable
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetCloseHandle
InternetOpenA
gdiplus
GdipAlloc
GdipCreateBitmapFromStream
GdipCreateBitmapFromStreamICM
GdipCreateHBITMAPFromBitmap
GdipCloneImage
GdipFree
GdiplusShutdown
GdiplusStartup
GdipDisposeImage
kernel32
ExitProcess
RtlUnwind
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
TerminateProcess
SetStdHandle
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
SetErrorMode
WritePrivateProfileStringA
GetOEMCP
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalFlags
GetFileTime
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentThread
lstrcmpA
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
FindFirstFileA
FindNextFileA
FindClose
LeaveCriticalSection
EnterCriticalSection
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedIncrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
GetModuleHandleA
SetLastError
FormatMessageA
LocalFree
lstrcpynA
GetSystemDirectoryA
CreateFileA
WriteFile
CloseHandle
GetTickCount
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalReAlloc
GlobalFree
FreeResource
GetCPInfo
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
MultiByteToWideChar
FreeLibrary
LoadLibraryA
GetProcAddress
MulDiv
CreateMutexA
GetLastError
GetWindowsDirectoryA
CreateDirectoryA
DeleteFileA
SetCurrentDirectoryA
WaitForSingleObject
lstrlenW
InterlockedDecrement
WinExec
Sleep
GetCurrentDirectoryA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetFileType
user32
GetDCEx
LockWindowUpdate
PostThreadMessageA
SetParent
SetWindowContextHelpId
MapDialogRect
wsprintfA
CharNextA
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsChild
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
TrackPopupMenu
GetKeyState
UpdateWindow
GetMenu
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
PtInRect
GetWindow
GetMenuStringA
GetFocus
SetFocus
ShowWindow
MoveWindow
GetDlgCtrlID
SetWindowTextA
SendDlgItemMessageA
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
EndDialog
ReleaseCapture
SetWindowRgn
DestroyCursor
WindowFromPoint
GetNextDlgTabItem
GetActiveWindow
ClientToScreen
FrameRect
InflateRect
DrawStateA
IsMenu
GetMenuItemInfoA
GetSysColorBrush
GetSysColor
DrawIconEx
DestroyIcon
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
ModifyMenuA
GetSubMenu
GetMenuState
GetMenuItemID
GetMenuItemCount
CreatePopupMenu
CreateMenu
DrawEdge
FillRect
CopyRect
CharUpperA
LoadCursorA
LoadImageA
GetDC
ReleaseDC
SystemParametersInfoA
IsWindow
GetParent
GetWindowRect
LoadBitmapA
OffsetRect
SetRect
MessageBeep
GetNextDlgGroupItem
SetCapture
InvalidateRgn
CopyAcceleratorTableA
RegisterClipboardFormatA
WaitMessage
SetRectEmpty
IsRectEmpty
SetCursor
GetWindowTextA
GetWindowTextLengthA
IsWindowVisible
GetForegroundWindow
GetSystemMetrics
LoadIconA
KillTimer
SetTimer
GetClientRect
IsIconic
AppendMenuA
PostQuitMessage
GetWindowLongA
EndPaint
BeginPaint
GetWindowDC
DestroyMenu
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowLongA
BringWindowToTop
SetForegroundWindow
SetActiveWindow
SetWindowPos
UnregisterClassA
EnableWindow
InvalidateRect
PostMessageA
SendMessageA
IsDialogMessageA
gdi32
SelectClipRgn
CreateRectRgn
GetViewportExtEx
GetWindowExtEx
GetTextColor
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreatePatternBrush
GetCharWidthA
SetRectRgn
GetMapMode
GetRgnBox
GetBkColor
GetClipBox
ExtCreateRegion
CombineRgn
StretchDIBits
CreateBitmap
SetBkColor
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
PtVisible
GetTextExtentPoint32A
SetPixel
GetPixel
PatBlt
Ellipse
GetBkMode
CreateCompatibleBitmap
CreateFontIndirectA
CreateSolidBrush
CreatePen
DeleteObject
GetDeviceCaps
BitBlt
CreateCompatibleDC
GetObjectA
CreateFontA
SetTextColor
GetStockObject
CreateDIBSection
SelectObject
DeleteDC
GetTextExtentPoint32W
Escape
ExtTextOutA
TextOutA
RectVisible
CreateRectRgnIndirect
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegSetValueExA
shell32
ShellExecuteExA
SHFileOperationA
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
ImageList_GetImageCount
ImageList_AddMasked
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_Draw
_TrackMouseEvent
ImageList_Destroy
ImageList_Create
shlwapi
SHDeleteKeyA
UrlUnescapeA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
oledlg
ord8
ole32
OleRun
CoCreateInstance
CoInitialize
CreateStreamOnHGlobal
CoTaskMemFree
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoDisconnectObject
CoTaskMemAlloc
oleaut32
SysAllocStringByteLen
SafeArrayDestroy
SystemTimeToVariantTime
VariantCopy
SysStringLen
OleCreateFontIndirect
VariantChangeType
VariantInit
SysAllocString
SysAllocStringLen
VariantClear
SysFreeString
SysStringByteLen
LoadTypeLi
GetErrorInfo
urlmon
URLDownloadToFileA
ws2_32
closesocket
accept
socket
select
gethostbyname
htons
inet_addr
bind
WSAGetLastError
WSASetLastError
connect
htonl
sendto
recvfrom
WSAAsyncSelect
send
recv
WSACleanup
WSAStartup
iphlpapi
GetAdaptersInfo
winmm
PlaySoundA
Sections
.text Size: 276KB - Virtual size: 275KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ