c:\work\사이트\닥터스파이제로\updater\Release\updater.pdb
Static task
static1
Behavioral task
behavioral1
Sample
76124e1b2fb4b50ebd5f6ec731706c09_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76124e1b2fb4b50ebd5f6ec731706c09_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
76124e1b2fb4b50ebd5f6ec731706c09_JaffaCakes118
-
Size
404KB
-
MD5
76124e1b2fb4b50ebd5f6ec731706c09
-
SHA1
3cde6d3a925ac97e210ac1454f5de7a7eecd967f
-
SHA256
c9d39859690f576b6612d0b58827f345f6e80302b76146d74376e2b5520e5e2b
-
SHA512
c85112ae28cca46e7f3eb70cbad2ec1e45246b8402c81b1336dad90a1f3c380c5f4b3af07322890457c4ed8dbc96f88183f90d5383c5c57e797c6665f32fbb79
-
SSDEEP
6144:CKf1oqd1CyZ5bxHM9Kl+psMWiQFukImdlq/:CKfGCRxHTcpsMjc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76124e1b2fb4b50ebd5f6ec731706c09_JaffaCakes118
Files
-
76124e1b2fb4b50ebd5f6ec731706c09_JaffaCakes118.exe windows:4 windows x86 arch:x86
e480722c7a43308571bbb79f7655037b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
netapi32
Netbios
iphlpapi
GetAdaptersInfo
kernel32
ExitProcess
RtlUnwind
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetTimeFormatA
GetDateFormatA
TerminateProcess
GetStartupInfoA
GetCommandLineA
ExitThread
CreateThread
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
WritePrivateProfileStringA
SetErrorMode
RaiseException
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
InterlockedDecrement
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
lstrcatA
ReadFile
GetFileTime
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
GetFullPathNameA
lstrcpyA
WaitForSingleObject
GetFileSize
FileTimeToLocalFileTime
FileTimeToSystemTime
GetVolumeInformationA
GetSystemDirectoryA
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
GetLastError
GetModuleFileNameA
MultiByteToWideChar
GetFileAttributesA
FindFirstFileA
FindClose
lstrlenA
Sleep
CreateProcessA
DeleteFileA
GetComputerNameA
CreateFileA
WriteFile
CloseHandle
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
CreateDirectoryA
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetTickCount
user32
GetSysColorBrush
DestroyMenu
SetCursor
PostQuitMessage
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetDesktopWindow
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMessageA
GetActiveWindow
GetCursorPos
ValidateRect
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
SetWindowTextA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
GetClassLongA
GetClassInfoExA
GetClassNameA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
IsWindow
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
GetParent
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
PtInRect
GetWindow
PeekMessageA
DispatchMessageA
IsDialogMessageA
CallNextHookEx
TranslateMessage
GetSystemMetrics
IsIconic
DrawIcon
CopyRect
CharUpperA
MessageBoxA
LoadIconA
LoadCursorA
FindWindowA
wsprintfA
EnableWindow
InvalidateRect
GetClientRect
PostMessageA
SendMessageA
LoadBitmapA
SetPropA
gdi32
PtVisible
CreateFontIndirectA
DPtoLP
DeleteObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
GetStockObject
BitBlt
CreateCompatibleDC
GetObjectA
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
SelectObject
RectVisible
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
comctl32
ord17
shlwapi
PathIsUNCA
UrlUnescapeA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
ole32
CoCreateInstance
CoInitialize
oleaut32
VariantInit
SystemTimeToVariantTime
VarUdateFromDate
VariantClear
VariantChangeType
wininet
InternetCloseHandle
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetGetLastResponseInfoA
HttpQueryInfoA
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlA
Sections
.text Size: 176KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ