d:\김민정\프로그램\업데이트모듈\동의창\Lottocube\소스\메인\인스톨\lottoins.exe_1.0.0.5 - 메인실행\Release\SantaSetup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
a57c1fc3de7ea42d317657a2c95532e4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a57c1fc3de7ea42d317657a2c95532e4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a57c1fc3de7ea42d317657a2c95532e4_JaffaCakes118
-
Size
312KB
-
MD5
a57c1fc3de7ea42d317657a2c95532e4
-
SHA1
c1ba2834001c8a5f6d92bb28ccb459f858cdf7b0
-
SHA256
fded3250fe77d9f6496cc642e92568ca6bc80bc68142e6df25189e3c8a065e01
-
SHA512
c7f1294315c265b3c3c8d612cdf0952dc9d7360954ea78e734d53f3465ef8c77a151f5a066650a115149de99b94e03da01c392a043d714f00df8b273a6332ded
-
SSDEEP
6144:nBLV58ah6RLUO4I9wJUb898OjM3Fvg7sxzY:nBx58fAO4I9UUbbwM3Dx8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a57c1fc3de7ea42d317657a2c95532e4_JaffaCakes118
Files
-
a57c1fc3de7ea42d317657a2c95532e4_JaffaCakes118.exe windows:4 windows x86 arch:x86
9012e10e54e67d6b89da501b018e47d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetCloseHandle
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetErrorDlg
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCrackUrlA
InternetOpenUrlA
kernel32
ExitProcess
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
SetErrorMode
GetOEMCP
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
InterlockedIncrement
WritePrivateProfileStringA
GetFileTime
RaiseException
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
InterlockedDecrement
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
FindFirstFileA
FileTimeToLocalFileTime
FindNextFileA
FindClose
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcatA
lstrcmpW
SetLastError
FormatMessageA
lstrcpynA
LocalFree
GlobalUnlock
GlobalFree
GetCurrentThreadId
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
ConvertDefaultLocale
EnumResourceLanguagesA
FreeLibrary
LoadLibraryA
GetProcAddress
MulDiv
OutputDebugStringA
FreeResource
GetCPInfo
GetTickCount
GetFileSize
FileTimeToSystemTime
GetFileAttributesA
ReadFile
SetFilePointer
GetCurrentDirectoryA
Process32First
Process32Next
GetExitCodeProcess
CreateToolhelp32Snapshot
Module32First
Module32Next
OpenProcess
TerminateProcess
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
MultiByteToWideChar
Sleep
CreateFileA
GetModuleFileNameA
lstrcpyA
lstrlenA
WriteFile
CloseHandle
CreateProcessA
SetThreadPriority
GetCurrentThread
GetCurrentProcess
SetPriorityClass
ResumeThread
CreateMutexA
GetLastError
GetWindowsDirectoryA
CreateDirectoryA
DeleteFileA
SetCurrentDirectoryA
WinExec
WaitForSingleObject
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetUnhandledExceptionFilter
user32
ReleaseCapture
EndPaint
BeginPaint
GetWindowDC
DestroyMenu
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
UpdateWindow
GetMenu
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
PtInRect
GetWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
EndDialog
IsWindowVisible
EqualRect
LoadCursorA
IsWindow
IsRectEmpty
SetWindowPos
SetActiveWindow
PostMessageA
SetCursor
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
GetWindowRect
OffsetRect
GetSysColorBrush
SystemParametersInfoA
GetSysColor
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
ModifyMenuA
GetSubMenu
GetMenuState
GetMenuItemID
GetMenuItemCount
LoadBitmapA
CopyRect
SetRect
GetDesktopWindow
CharUpperA
CharNextA
SetCapture
GetWindowLongA
SetWindowLongA
GetSystemMetrics
LoadIconA
EnableWindow
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
wsprintfA
PostQuitMessage
SetForegroundWindow
FindWindowA
AdjustWindowRectEx
MoveWindow
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetBkColor
CreateRectRgnIndirect
GetMapMode
GetTextColor
GetRgnBox
CreateBitmap
SetBkColor
SetTextColor
GetStockObject
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
GetClipBox
GetDeviceCaps
GetObjectA
SelectObject
DeleteObject
DeleteDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
AdjustTokenPrivileges
shell32
SHGetSpecialFolderPathA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
UrlUnescapeA
oledlg
ord8
ole32
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRevokeClassObject
CoTaskMemAlloc
CoGetClassObject
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromString
CLSIDFromProgID
oleaut32
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantChangeType
SysAllocString
VariantClear
VariantInit
SafeArrayDestroy
SystemTimeToVariantTime
OleCreateFontIndirect
VariantCopy
urlmon
URLDownloadToFileA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 196KB - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ