Behavioral task
behavioral1
Sample
611fb912ca0d8a8d6b57a5fe54c4b3ad_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
611fb912ca0d8a8d6b57a5fe54c4b3ad_JaffaCakes118
-
Size
221KB
-
MD5
611fb912ca0d8a8d6b57a5fe54c4b3ad
-
SHA1
d30d809df1e1f8db5511621c4869cf954d9ffe32
-
SHA256
b3781927bcf7932c336630f636f47cbdba47e2f5aa94039f87fbb15797455535
-
SHA512
812426a098f3d277e9d004e9fd288d2fe26ba410d4a79db1338c8f8faca03cb0f33da84f1f8575ab37dd554e26cff52428c3c10cc585d1c96df88e140ae056ef
-
SSDEEP
6144:9iCJP2aHc28pmBIUFqOkTo2/Pd7IYbUN0DQ2:9f82DICqJTo2tcqUN
Malware Config
Extracted
qakbot
324.75
spx88
1585759147
70.171.43.208:443
75.183.171.155:3389
68.49.120.179:443
189.160.175.134:443
24.168.237.215:443
5.14.217.101:443
47.40.244.237:443
71.77.252.14:2222
184.176.139.8:443
47.39.76.74:443
72.29.181.77:2222
208.101.148.129:995
100.40.48.96:443
5.233.232.81:61202
188.241.126.118:443
68.174.15.223:443
64.19.74.29:995
70.170.111.174:443
75.82.228.209:443
63.155.135.211:995
47.153.115.154:993
24.37.178.158:443
207.255.18.67:443
156.96.45.215:443
89.137.62.72:443
188.240.233.107:995
5.14.158.191:443
137.99.224.198:443
70.174.3.241:443
174.125.10.8:443
24.37.178.158:995
151.205.102.42:443
76.23.204.29:443
68.14.210.246:22
74.75.237.11:443
79.113.148.151:443
24.44.180.236:2222
100.43.250.74:995
80.11.10.151:990
71.193.126.206:443
75.137.60.81:443
24.32.119.146:443
47.157.85.96:443
181.126.86.223:443
152.32.80.37:443
187.212.154.43:443
65.96.36.157:443
188.173.185.139:443
73.125.11.8:443
95.76.27.89:443
100.1.239.189:443
82.137.63.170:443
5.12.213.152:2222
72.82.229.191:993
86.126.209.125:443
72.29.181.77:2078
72.190.101.70:443
209.137.209.163:995
47.180.66.10:443
98.13.0.128:443
79.113.219.121:443
216.146.110.68:443
184.180.157.203:2222
70.191.103.164:443
199.241.223.66:443
98.213.28.175:443
46.214.62.199:443
206.255.163.120:443
68.134.181.98:443
50.244.112.106:443
100.33.132.135:443
98.27.176.35:443
5.15.64.54:443
76.174.122.204:443
190.162.185.190:0
76.180.69.236:443
70.124.29.226:443
12.5.37.3:443
39.59.84.133:995
68.204.164.222:443
78.97.116.41:443
50.247.230.33:995
173.69.58.179:443
108.190.151.108:2222
98.243.187.85:443
95.76.139.100:443
108.227.161.27:995
47.136.224.60:443
85.7.22.186:2222
79.113.192.228:443
168.103.52.44:995
137.119.71.87:443
24.158.103.220:443
5.14.187.133:443
104.174.71.153:2222
172.78.27.85:443
81.103.144.77:443
79.114.194.106:443
75.89.199.86:443
174.82.131.155:995
45.3.219.138:443
70.126.76.75:443
173.172.205.216:443
188.173.70.18:443
71.233.73.222:995
87.65.204.240:995
73.214.231.2:443
98.11.109.156:443
89.137.162.193:443
35.143.205.199:443
50.246.229.50:443
73.156.64.203:443
75.182.220.196:2222
77.159.149.74:443
86.125.180.36:443
96.57.237.162:443
71.178.38.101:443
98.164.253.75:443
47.146.169.85:443
172.58.107.229:2222
72.142.106.198:995
24.210.45.215:443
41.97.52.209:443
98.204.224.168:443
74.194.4.181:443
35.142.177.227:443
162.40.242.161:443
67.131.59.17:443
35.142.24.147:2222
71.69.128.2:2222
96.227.122.123:443
86.189.181.83:443
65.131.79.162:995
24.37.178.158:990
69.245.144.167:443
50.244.112.10:443
23.240.76.67:443
172.78.87.180:443
50.108.212.180:443
72.209.191.27:443
172.113.74.96:443
47.202.98.230:443
80.14.209.42:2222
86.124.109.100:443
74.222.204.82:443
81.102.127.116:443
94.59.237.62:995
68.174.9.179:443
95.77.144.238:443
24.234.86.201:995
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 611fb912ca0d8a8d6b57a5fe54c4b3ad_JaffaCakes118
Files
-
611fb912ca0d8a8d6b57a5fe54c4b3ad_JaffaCakes118.exe windows:5 windows x86 arch:x86
3489ec6897bf25dd7f5d86ee09369d0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
GetUserProfileDirectoryW
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
CoSetProxyBlanket
CoInitialize
CoInitializeSecurity
shell32
CommandLineToArgvW
ShellExecuteW
SHGetFolderPathW
setupapi
SetupDiGetClassDevsA
SetupDiGetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
kernel32
GetLastError
GetProcAddress
LoadLibraryA
lstrcmpiW
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetEnvironmentVariableW
lstrlenA
WideCharToMultiByte
lstrcatA
GetEnvironmentVariableA
MultiByteToWideChar
lstrlenW
lstrcatW
lstrcpyA
HeapAlloc
HeapFree
HeapCreate
VirtualAlloc
GetFileSize
lstrcmpiA
GetModuleFileNameA
FindResourceA
LoadResource
SizeofResource
GetThreadContext
CreateEventA
GetModuleHandleW
LoadLibraryW
TerminateProcess
DeleteFileW
ResumeThread
ExpandEnvironmentStringsW
GetComputerNameW
GetVolumeInformationW
ReleaseMutex
GetExitCodeProcess
GetSystemTimeAsFileTime
SetEnvironmentVariableW
GetTickCount
GetModuleFileNameW
GetSystemInfo
SetEnvironmentVariableA
GetVersionExA
CopyFileW
SetEvent
OpenEventA
CreateMutexA
TerminateThread
CreateThread
GetFileAttributesA
GetFileAttributesW
GetCurrentThread
LocalAlloc
GetLocalTime
LocalFree
lstrcpyW
CreateDirectoryW
SleepEx
WaitForSingleObject
FreeLibrary
GetDriveTypeW
lstrcmpA
GetCommandLineW
ExitProcess
lstrcpynW
Sleep
SystemTimeToFileTime
GetSystemTime
GetCurrentProcess
GetWindowsDirectoryW
user32
CharUpperBuffA
MessageBoxA
GetClassNameA
CharUpperBuffW
advapi32
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegQueryInfoKeyW
LookupAccountNameW
EqualSid
SetServiceStatus
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
RegSetValueExW
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegCloseKey
SetFileSecurityW
OpenProcessToken
GetSidSubAuthority
OpenThreadToken
GetSidSubAuthorityCount
LookupAccountSidW
CreateProcessAsUserW
msvcrt
memcpy
memset
_vsnwprintf
_vsnprintf
_except_handler3
_ltoa
netapi32
NetApiBufferFree
NetUserEnum
NetGetDCName
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ