d:\김민정\프로그램\업데이트모듈\동의창\Sms\Sms1000\소스\메인\인스톨\smsmins.exe_1.0.0.9\Release\SantaSetup.pdb
Static task
static1
Behavioral task
behavioral1
Sample
45fcd9fc3af05df088a89713cf261a90_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45fcd9fc3af05df088a89713cf261a90_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
45fcd9fc3af05df088a89713cf261a90_JaffaCakes118
-
Size
299KB
-
MD5
45fcd9fc3af05df088a89713cf261a90
-
SHA1
446e7cb47112f6f6dd2e12e249cecabaf53efcd7
-
SHA256
ffd743734af02d54f136de18cb0a2897e3e40fde7b08a1e52c28af93829d0bd7
-
SHA512
ed8f313ae2c0ae42c6e0be108bb567d2804fa6d503912d38d8fd71a3e9b1d0582711e9f602ab750d42ac0b73f13a98ebbce3cff994bfb0e9bff2ebc8e6c46800
-
SSDEEP
6144:OVAL1aQugfm9t6fCSr13Y9X6iot5xch6WZewvaxSvfNL4a:OVABaQne9t6fCSr13Y9Xrot5i3eBxSxX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45fcd9fc3af05df088a89713cf261a90_JaffaCakes118
Files
-
45fcd9fc3af05df088a89713cf261a90_JaffaCakes118.exe windows:4 windows x86 arch:x86
e11c104839a6cd00c2e614ca40a7a9ef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
wininet
InternetCanonicalizeUrlA
InternetCloseHandle
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetErrorDlg
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCrackUrlA
kernel32
ExitProcess
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
SetErrorMode
GetOEMCP
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
InterlockedIncrement
WritePrivateProfileStringA
GetFileTime
RaiseException
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
InterlockedDecrement
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
FindFirstFileA
FileTimeToLocalFileTime
FindNextFileA
FindClose
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcatA
lstrcmpW
SetLastError
FormatMessageA
lstrcpynA
LocalFree
GlobalUnlock
GlobalFree
GetCurrentThreadId
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
ConvertDefaultLocale
EnumResourceLanguagesA
FreeLibrary
LoadLibraryA
GetProcAddress
MulDiv
OutputDebugStringA
FreeResource
GetCPInfo
GetTickCount
GetFileSize
FileTimeToSystemTime
GetFileAttributesA
ReadFile
SetFilePointer
GetCurrentDirectoryA
Process32First
Process32Next
GetExitCodeProcess
CreateToolhelp32Snapshot
Module32First
Module32Next
OpenProcess
TerminateProcess
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
MultiByteToWideChar
Sleep
CreateFileA
GetModuleFileNameA
lstrcpyA
lstrlenA
WriteFile
CloseHandle
CreateProcessA
SetThreadPriority
GetCurrentThread
GetCurrentProcess
SetPriorityClass
ResumeThread
CreateMutexA
GetLastError
GetWindowsDirectoryA
CreateDirectoryA
DeleteFileA
SetCurrentDirectoryA
WinExec
WaitForSingleObject
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetUnhandledExceptionFilter
user32
ReleaseCapture
EndPaint
BeginPaint
GetWindowDC
DestroyMenu
ShowWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
UpdateWindow
GetMenu
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
PtInRect
GetWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
EndDialog
IsWindowVisible
EqualRect
LoadCursorA
IsWindow
IsRectEmpty
SetWindowPos
SetActiveWindow
PostMessageA
SetCursor
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
GetWindowRect
OffsetRect
GetSysColorBrush
SystemParametersInfoA
GetSysColor
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
ModifyMenuA
GetSubMenu
GetMenuState
GetMenuItemID
GetMenuItemCount
LoadBitmapA
CopyRect
SetRect
GetDesktopWindow
CharUpperA
CharNextA
SetCapture
GetWindowLongA
SetWindowLongA
GetSystemMetrics
LoadIconA
EnableWindow
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
wsprintfA
PostQuitMessage
SetForegroundWindow
FindWindowA
AdjustWindowRectEx
MoveWindow
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetBkColor
CreateRectRgnIndirect
GetMapMode
GetTextColor
GetRgnBox
CreateBitmap
SetBkColor
SetTextColor
GetStockObject
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
GetClipBox
GetDeviceCaps
GetObjectA
SelectObject
DeleteObject
DeleteDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
AdjustTokenPrivileges
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
UrlUnescapeA
oledlg
ord8
ole32
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRevokeClassObject
CoTaskMemAlloc
CoGetClassObject
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromString
CLSIDFromProgID
oleaut32
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantChangeType
SysAllocString
VariantClear
VariantInit
SafeArrayDestroy
SystemTimeToVariantTime
OleCreateFontIndirect
VariantCopy
urlmon
URLDownloadToFileA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 188KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ