F:\작업\퍼스트클릭\FirstClick(ch8)\Release\FirstClickUninstaller.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ba468309e2bd798c7aa8c9b403d74c3d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba468309e2bd798c7aa8c9b403d74c3d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba468309e2bd798c7aa8c9b403d74c3d_JaffaCakes118
-
Size
139KB
-
MD5
ba468309e2bd798c7aa8c9b403d74c3d
-
SHA1
140497f29d3cbc92b9aed9684dbe9bfd862441d6
-
SHA256
a34288396274994d21d05b3b5127f2d84fa0a137acde657fade2aeea5e0fcb09
-
SHA512
338eec5a4664003ab3a349f22946d35fc77d2286a18fb9c53a1e37a10e6d82aedcb96830af2b02b26ed64f9ad9d39a6b434d7dca2f36b2e2efef9880d6f99bae
-
SSDEEP
1536:tQ5d5AWqygfJbyUcG+C2QCWQt23Od/8ms8N5jre:WXwZyUcBCyRd/8ms8N5j6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ba468309e2bd798c7aa8c9b403d74c3d_JaffaCakes118
Files
-
ba468309e2bd798c7aa8c9b403d74c3d_JaffaCakes118.exe windows:5 windows x86 arch:x86
83258a4b0733157fee6a442b02b219c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
iphlpapi
GetAdaptersInfo
kernel32
FindResourceExA
WideCharToMultiByte
GetTempPathA
CreateDirectoryA
GetSystemTime
FindFirstFileA
FindNextFileA
FindClose
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
InterlockedIncrement
InterlockedDecrement
FindResourceA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoA
LoadResource
LockResource
SizeofResource
CloseHandle
CreateThread
GetExitCodeProcess
Sleep
CopyFileA
GetModuleFileNameA
GetWindowsDirectoryA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetModuleHandleA
VirtualAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetLastError
MultiByteToWideChar
lstrlenA
GetCommandLineA
GetStartupInfoA
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
user32
TranslateMessage
GetMessageA
LoadStringA
EndPaint
DrawTextA
DispatchMessageA
LoadBitmapA
PostQuitMessage
GetDlgItem
SendMessageA
InvalidateRect
UpdateWindow
ShowWindow
GetSystemMetrics
MoveWindow
GetWindowRect
LoadIconA
SetClassLongA
CreateDialogParamA
SetRect
BeginPaint
gdi32
CreateCompatibleDC
SetBkMode
DeleteDC
BitBlt
SelectObject
CreateFontA
advapi32
RegOpenKeyA
RegDeleteKeyA
RegDeleteValueA
shell32
ShellExecuteExA
ole32
OleRun
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantClear
GetErrorInfo
shlwapi
PathFileExistsA
Sections
.text Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 500KB - Virtual size: 499KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ