G:\projects\funny\CQXZS\org\传奇DPK\bin\DPK.pdb
Static task
static1
Behavioral task
behavioral1
Sample
9df90cb68e3bd51baad9ae71bc1f4f10_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9df90cb68e3bd51baad9ae71bc1f4f10_JaffaCakes118.dll
Resource
win10v2004-20240508-en
General
-
Target
9df90cb68e3bd51baad9ae71bc1f4f10_JaffaCakes118
-
Size
3.3MB
-
MD5
9df90cb68e3bd51baad9ae71bc1f4f10
-
SHA1
8d1ba34cfb2c04c80fccca43a8fd2f9549c06507
-
SHA256
1e23ffafb1b35a6e58e356d274ac78dfb57a8883b4d4e37d9342dea82ee9b2d1
-
SHA512
7006ca2393f1b36494dae8863411ef85b807566cfe2a2231f5fe619ddd5cdcf0afb2a0d3bac373ec6fcf07cd9a7b7300aa06051de3eaab340dd5a5960b19f080
-
SSDEEP
98304:E6L61mfVcIcVi00vbmCti4FfOZAkwaEGXmdr70fTSASL2M2hZd:E6L8fibp2dEIfT9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9df90cb68e3bd51baad9ae71bc1f4f10_JaffaCakes118
Files
-
9df90cb68e3bd51baad9ae71bc1f4f10_JaffaCakes118.dll windows:5 windows x86 arch:x86
ec149666ec42c3fba9ffcad0564641d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
WSAStartup
gethostname
ioctlsocket
listen
accept
recvfrom
sendto
getaddrinfo
freeaddrinfo
connect
socket
closesocket
getpeername
getsockopt
htons
bind
ntohs
WSASetLastError
__WSAFDIsSet
WSAGetLastError
select
recv
getsockname
setsockopt
WSAIoctl
send
WSACleanup
winmm
PlaySoundA
wldap32
ord27
ord301
ord33
ord200
ord79
ord35
ord32
ord41
ord26
ord50
ord60
ord143
ord211
ord22
ord30
ord46
kernel32
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
VirtualAlloc
CreateThread
GetCurrentProcessId
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
GetVersionExA
IsWow64Process
GetCurrentProcess
GetModuleHandleA
GetProcAddress
LoadLibraryA
Sleep
GetLastError
FindFirstFileA
FindClose
TerminateThread
GetTickCount
OutputDebugStringA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
CreateEventA
SetEvent
ResetEvent
WaitForSingleObject
ExitProcess
VirtualQueryEx
GetModuleFileNameA
VirtualFree
GetCurrentThreadId
FindNextFileA
CreateDirectoryA
FileTimeToSystemTime
CopyFileA
GlobalFree
GlobalUnlock
WriteFile
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
SleepEx
VerifyVersionInfoA
VerSetConditionMask
FormatMessageA
ReadFile
PeekNamedPipe
WaitForMultipleObjects
GetFileType
GetStdHandle
ExpandEnvironmentStringsA
GetFullPathNameA
FlushFileBuffers
SetStdHandle
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetStartupInfoW
SetHandleCount
HeapSize
GetConsoleMode
GetConsoleCP
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
InitializeCriticalSectionAndSpinCount
HeapDestroy
HeapCreate
GetModuleHandleW
GetLocaleInfoW
GetModuleFileNameW
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
LCMapStringW
RaiseException
FindFirstFileExA
GetDriveTypeA
GetFileInformationByHandle
FileTimeToLocalFileTime
ExitThread
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
HeapFree
HeapAlloc
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
CreateFileA
GlobalLock
GlobalAlloc
VirtualProtect
VirtualQuery
GetCurrentDirectoryW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
LoadLibraryW
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
GetDriveTypeW
SetEndOfFile
GetProcessHeap
CreateFileW
LoadLibraryExA
SetFilePointer
CreateProcessA
DuplicateHandle
GetExitCodeProcess
MoveFileA
DeleteFileA
GetTimeFormatA
GetDateFormatA
CreatePipe
FreeLibrary
SystemTimeToFileTime
MulDiv
GetCurrentDirectoryA
GetACP
GetFileSize
FindResourceA
LoadResource
FreeResource
SizeofResource
LockResource
DecodePointer
EncodePointer
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
user32
SetWindowTextA
SetPropA
InvalidateRect
GetClassInfoExA
RegisterClassExA
RegisterClassA
GetWindowTextLengthA
GetCursorPos
SetRect
DestroyWindow
GetPropA
IntersectRect
VkKeyScanA
GetParent
EnumWindows
GetActiveWindow
WindowFromPoint
GetWindow
IsWindowVisible
PostQuitMessage
SetWindowRgn
GetWindowRect
ScreenToClient
IsIconic
MonitorFromWindow
GetMonitorInfoA
FillRect
CallWindowProcA
GetWindowThreadProcessId
CharLowerA
SetWindowLongA
GetWindowLongA
CharUpperA
MessageBoxA
SetForegroundWindow
GetClientRect
GetWindowTextA
TranslateMessage
GetClassNameA
GetForegroundWindow
GetKeyState
SetTimer
KillTimer
IsWindow
SendMessageA
wsprintfA
SendInput
SetCursorPos
ClientToScreen
keybd_event
PostMessageA
MapVirtualKeyA
ReleaseDC
GetDC
CharPrevA
DrawTextA
MoveWindow
CreateAcceleratorTableA
InvalidateRgn
GetSysColor
SetCaretPos
ShowCaret
HideCaret
CreateCaret
ReleaseCapture
SetCapture
GetFocus
GetUpdateRect
BeginPaint
EndPaint
IsRectEmpty
CharNextA
PtInRect
SetCursor
LoadCursorA
OffsetRect
wvsprintfA
DefWindowProcA
CreateWindowExA
ShowWindow
SetFocus
EnableWindow
SetWindowPos
SystemParametersInfoA
MapWindowPoints
gdi32
GetTextExtentPoint32A
RoundRect
MoveToEx
LineTo
SetBkColor
ExtTextOutA
SetStretchBltMode
StretchBlt
CreateDIBSection
GetClipBox
ExtSelectClipRgn
SelectClipRgn
GetTextMetricsA
SaveDC
RestoreDC
SetWindowOrgEx
CreateFontIndirectA
TextOutA
SetBkMode
SetTextColor
Rectangle
CreatePen
SetPixel
CombineRgn
CreateRoundRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GetDeviceCaps
CreateDCA
GetCharABCWidthsA
advapi32
CryptCreateHash
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
CryptHashData
CryptAcquireContextA
shell32
DragQueryFileA
DragFinish
ntdll
RtlUnwind
NtQueryInformationThread
wininet
InternetSetOptionA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
ole32
CLSIDFromProgID
OleLockRunning
CLSIDFromString
CoCreateInstance
comctl32
ord17
_TrackMouseEvent
riched20
ord4
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 343KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 270KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ