Behavioral task
behavioral1
Sample
0c9bef0496980f1304a14e3fa7737146_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0c9bef0496980f1304a14e3fa7737146_JaffaCakes118.dll
Resource
win10v2004-20240419-en
General
-
Target
0c9bef0496980f1304a14e3fa7737146_JaffaCakes118
-
Size
167KB
-
MD5
0c9bef0496980f1304a14e3fa7737146
-
SHA1
4a40d0bbe792271c0911c09c5cdd577d7e38a399
-
SHA256
52321edc0c5a3fcb824d591c730e7783194ec5e1c0f617b40ffe760a876924eb
-
SHA512
a910b0db163f6cec3914096b3b5a05503a3e92cec82fe60e900157a173bdc154c7376bb229b01612b05eb084427ea3820291d66714b00fd9bec7098972aef916
-
SSDEEP
3072:WAOoSg75OpGZlF9HX2okHlmzCSkiNi1ai2SHs1XveZCU:WAOoDMpGZz9GuCEkavSH2eZ7
Malware Config
Extracted
qakbot
322.148
1518695014
Protocol: ftp- Host:
66.96.133.9 - Port:
21 - Username:
help - Password:
eT5TerAcnFe6~
Protocol: ftp- Host:
174.123.38.58 - Port:
21 - Username:
[email protected] - Password:
4BQ1MeeRAwNZEVu
Protocol: ftp- Host:
61.221.12.26 - Port:
21 - Username:
[email protected] - Password:
346HZGCMlwecz9S
Protocol: ftp- Host:
67.222.137.18 - Port:
21 - Username:
[email protected] - Password:
p4a8k6fE1FtA3pR
Protocol: ftp- Host:
107.6.152.61 - Port:
21 - Username:
[email protected] - Password:
RoP4Af0RKAAQ74V
179.62.153.88:443
50.198.141.161:2222
69.129.91.38:443
66.189.228.49:995
96.253.104.73:443
71.183.129.113:443
125.25.130.203:995
173.175.174.154:443
162.104.186.175:995
75.109.222.140:995
68.173.55.51:443
78.175.254.43:443
106.159.251.143:995
47.143.83.172:443
71.190.202.120:443
73.136.232.174:995
96.253.104.73:995
192.158.217.32:22
65.153.16.250:993
70.95.129.59:443
105.225.253.101:443
216.93.143.182:995
71.41.141.206:443
69.129.91.38:32102
47.223.78.244:993
47.40.29.239:443
47.33.213.104:443
74.93.207.181:993
178.54.193.161:443
156.217.12.177:443
66.222.48.40:443
96.70.92.177:1194
74.95.207.214:990
47.221.46.163:443
65.73.215.139:990
198.0.111.129:443
70.117.246.103:443
96.253.104.73:50002
24.240.235.106:443
68.133.47.184:443
70.167.30.88:443
216.218.74.196:443
199.115.167.168:443
132.206.59.132:443
74.95.207.214:443
72.204.249.114:2222
87.243.32.159:443
76.0.178.104:443
189.155.221.97:993
209.212.131.66:443
78.158.195.141:995
47.201.56.21:443
65.40.207.151:995
47.149.85.238:443
104.231.199.203:443
69.193.199.50:443
74.84.15.214:443
174.66.86.206:443
190.137.200.166:443
216.201.159.118:443
99.196.254.46:443
73.126.4.33:443
68.5.211.85:443
50.42.189.206:993
78.182.109.227:443
98.103.2.226:443
75.127.141.50:995
65.100.49.186:465
12.161.77.98:443
109.75.195.157:443
76.27.69.75:443
70.94.109.57:443
65.153.16.250:995
50.195.161.2:995
98.216.56.48:443
47.22.21.180:995
67.83.122.112:2222
209.213.24.194:443
97.68.164.170:990
24.176.181.14:443
142.114.93.235:2222
75.83.30.135:443
68.50.161.232:443
31.206.147.0:995
24.119.224.202:2078
68.0.186.126:443
184.186.73.221:443
100.35.65.82:995
174.57.88.157:443
46.175.67.170:443
50.74.66.214:443
96.85.138.153:995
71.85.72.9:443
175.107.54.44:443
65.153.16.250:465
103.228.43.58:443
76.104.40.157:443
68.203.159.21:443
73.1.116.205:443
86.57.136.126:990
73.136.132.231:443
192.158.217.32:443
70.189.67.15:443
45.36.199.50:443
186.107.214.4:443
173.49.95.92:443
203.109.206.203:465
73.198.142.130:995
174.58.149.247:443
98.74.157.85:443
73.206.97.214:443
104.33.67.39:443
135.84.195.154:995
189.155.221.97:995
73.182.163.200:443
50.73.23.181:995
74.95.207.214:995
73.93.154.150:443
186.109.26.149:443
65.100.49.186:443
74.95.207.214:465
74.69.244.255:443
68.83.130.163:443
73.77.17.146:443
108.58.129.90:443
74.42.21.175:995
49.151.84.2:443
108.35.28.73:443
98.218.243.27:443
76.177.73.90:995
71.41.225.171:443
24.187.255.116:443
24.223.103.6:443
74.95.207.214:993
76.95.241.114:443
69.41.8.88:443
23.240.50.137:443
47.201.138.241:443
69.132.80.73:443
68.198.107.62:2222
65.33.119.17:443
50.244.177.253:443
65.100.49.186:995
12.166.108.82:995
108.58.129.90:995
187.138.102.154:443
65.100.49.186:2222
50.44.111.101:443
170.231.89.56:2222
108.27.217.183:443
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0c9bef0496980f1304a14e3fa7737146_JaffaCakes118
Files
-
0c9bef0496980f1304a14e3fa7737146_JaffaCakes118.dll windows:5 windows x86 arch:x86
c4b72340eb58a93ce30c6bb398fbcbce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
iphlpapi
GetBestRoute
GetIpAddrTable
ws2_32
getnameinfo
connect
setsockopt
ioctlsocket
gethostbyaddr
listen
htons
bind
WSAGetLastError
getaddrinfo
sendto
freeaddrinfo
socket
WSAIoctl
accept
htonl
inet_addr
WSAStartup
WSACleanup
inet_ntoa
gethostbyname
ntohs
getsockname
select
__WSAFDIsSet
closesocket
send
recv
shlwapi
PathCombineA
StrCmpNA
PathMatchSpecA
StrStrIA
wvnsprintfW
wvnsprintfA
ole32
CoTaskMemFree
CoCreateInstance
CoInitialize
CoInitializeSecurity
CoInitializeEx
CoUninitialize
kernel32
OpenEventA
GetThreadContext
GetTickCount
GetWindowsDirectoryA
SetEnvironmentVariableA
GetModuleFileNameA
GetSystemInfo
VirtualAlloc
WriteFile
FlushFileBuffers
LocalAlloc
lstrcmpW
GetFileAttributesW
SetFileAttributesA
CopyFileA
ResumeThread
GetExitCodeProcess
lstrcpyW
SetFilePointer
lstrcpyA
lstrlenA
SetEvent
CreateEventA
lstrcmpA
ResetEvent
CreateMutexA
SleepEx
TerminateThread
GetExitCodeThread
DuplicateHandle
GetCurrentThread
GetCurrentProcess
Sleep
lstrcatA
MoveFileA
MoveFileExA
GetLastError
SetThreadPriority
GetEnvironmentVariableA
lstrcpynW
lstrlenW
lstrcatW
lstrcmpiW
DisconnectNamedPipe
ReadFile
ConnectNamedPipe
CreateNamedPipeA
ExitProcess
CloseHandle
WaitForSingleObject
GetProcessId
TerminateProcess
GetCurrentProcessId
CreateThread
CreateEventW
CreateFileA
GetLocalTime
LoadLibraryA
GetComputerNameA
DeleteFileA
CreateDirectoryA
DeleteFileW
LeaveCriticalSection
EnterCriticalSection
WaitForMultipleObjects
InitializeCriticalSection
GetComputerNameW
DeleteCriticalSection
GetVersionExA
lstrcmpiA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
QueryPerformanceCounter
QueryPerformanceFrequency
GetFileSize
GetFileAttributesA
HeapCreate
GetProcAddress
GetSystemTimeAsFileTime
FreeLibrary
SystemTimeToFileTime
GetSystemTime
MultiByteToWideChar
GetModuleHandleA
WideCharToMultiByte
ReleaseMutex
LoadResource
SizeofResource
FindResourceA
lstrcpynA
user32
MessageBoxW
CharUpperBuffA
MessageBoxA
DialogBoxParamA
DialogBoxParamW
GetWindowTextA
GetWindowTextW
GetWindowLongA
FindWindowA
PostMessageA
advapi32
GetTokenInformation
RegCloseKey
RegQueryInfoKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityInfo
GetSidSubAuthorityCount
GetSidSubAuthority
RegEnumKeyExA
OpenThreadToken
OpenProcessToken
EqualSid
CryptAcquireContextA
GetUserNameW
oleaut32
SysFreeString
VariantClear
VariantInit
Sections
.text Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ