c:\Users\DreamHunter\Desktop\Vaccine Src\naversetup\trunk\NaverAppSetupBuilder\Template\NaverAppSetupTemplate.pdb
Static task
static1
Behavioral task
behavioral1
Sample
837bfa4295f01b75fa6845e742c4cc3e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
837bfa4295f01b75fa6845e742c4cc3e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
837bfa4295f01b75fa6845e742c4cc3e_JaffaCakes118
-
Size
1.0MB
-
MD5
837bfa4295f01b75fa6845e742c4cc3e
-
SHA1
0ad4d7e8124d80824e33b37c114eaf6b2dfc42b3
-
SHA256
55deaca292eb99b48d143ce20a8a6a1d61e46db414c45eff550cd582994bc272
-
SHA512
6507f5b53d8742ed49b425c36574275e7a6f9fcab3af843be73d58e278acb9ef8b3cda5880e7254ea03007f43bece96710baede1fcd76df0d0f6be073d5f9511
-
SSDEEP
24576:ErR87mJXi1Y6j72SophX+2RRyBKVSCuL4/ag/SxItl0:E987LY6jvQhX+cz9SKwItl0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 837bfa4295f01b75fa6845e742c4cc3e_JaffaCakes118
Files
-
837bfa4295f01b75fa6845e742c4cc3e_JaffaCakes118.exe windows:4 windows x86 arch:x86
dfc469706a10e8b978f1353579575178
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
InterlockedDecrement
lstrlenW
RemoveDirectoryW
FindFirstFileW
InterlockedIncrement
GetExitCodeProcess
WaitForSingleObject
GetFileAttributesW
GetDiskFreeSpaceW
WideCharToMultiByte
GetModuleHandleW
GetVersionExW
DebugBreak
OutputDebugStringW
lstrlenA
GetCurrentProcess
GetCurrentProcessId
lstrcpynW
GetTempPathW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetTickCount
CreateDirectoryW
GetModuleFileNameW
GetSystemDirectoryW
FindResourceW
SizeofResource
LoadResource
LockResource
CreateFileW
SetFilePointer
WriteFile
DeleteFileW
LoadLibraryA
OpenProcess
CloseHandle
LoadLibraryW
GetProcAddress
RaiseException
FreeLibrary
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
GetLocaleInfoA
VirtualAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapReAlloc
GetModuleHandleA
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
HeapSize
user32
SetWindowPos
MessageBoxW
LoadStringW
CharLowerW
UnregisterClassA
GetWindowRect
SystemParametersInfoW
wsprintfW
EndDialog
CharNextW
wvsprintfW
advapi32
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
GetUserNameW
LookupAccountSidW
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
GetTokenInformation
RegEnumValueW
ole32
CoInitialize
CoCreateGuid
CoTaskMemFree
CoUninitialize
shell32
SHGetSpecialFolderPathW
ord680
ShellExecuteW
ShellExecuteExW
shlwapi
PathFindFileNameW
PathFileExistsW
Sections
.text Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ