Behavioral task
behavioral1
Sample
b70799c95dd29b4f2d5be5bc7feecf34_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b70799c95dd29b4f2d5be5bc7feecf34_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
b70799c95dd29b4f2d5be5bc7feecf34_JaffaCakes118
-
Size
261KB
-
MD5
b70799c95dd29b4f2d5be5bc7feecf34
-
SHA1
a5e33928c0c0d69bf70463ba5ec0935f53a941d8
-
SHA256
6f1ad1628709f22d04611614ed48f80ff051bb1253ca26a3f99d8dabcc828661
-
SHA512
d17d48045e8298a53e7f5406ebeb91e1425b43b32e9d9445c61d2373f673ee18846287a3d7f6a279d8468e680cf4247f1bb2fee40a2a834d6f0b997d2a77325c
-
SSDEEP
6144:QinCSbUlS2EqPgZXD3romJDq0orQWau0Vj6he+a9:QinCEpwYD7e0osRHEU/
Malware Config
Extracted
qakbot
324.75
spx91
1586271390
74.109.200.208:443
108.227.161.27:995
98.13.0.128:443
79.113.219.121:443
84.247.55.190:443
80.14.209.42:2222
104.36.135.227:443
104.174.71.153:2222
96.232.203.15:443
173.79.220.156:443
174.54.24.110:995
50.244.112.10:443
76.23.204.29:443
69.206.6.71:2222
81.106.46.63:443
50.91.171.137:443
75.137.60.81:443
98.116.119.123:443
189.140.74.166:443
24.183.39.93:443
71.197.126.250:443
24.26.1.14:2222
24.27.82.216:2222
100.38.164.182:443
85.204.189.105:443
47.24.47.218:443
50.108.212.180:443
72.228.3.116:443
188.27.17.115:443
68.116.193.239:443
184.167.2.251:2222
67.85.185.6:443
72.36.11.22:443
148.75.231.53:443
216.152.7.12:443
173.62.161.126:443
172.95.42.35:443
173.245.152.231:443
160.2.198.181:443
79.115.86.251:443
75.110.93.212:443
12.162.183.16:443
98.116.62.242:443
92.114.127.71:443
96.37.113.36:443
83.25.10.201:2222
71.77.231.251:443
71.11.209.101:443
79.117.209.13:21
70.166.158.118:443
174.126.230.25:443
24.55.152.50:995
72.36.59.46:2222
73.163.242.114:443
184.13.73.135:443
70.95.94.91:2078
208.126.142.17:443
173.173.1.164:443
74.102.83.89:443
72.209.191.27:443
181.197.195.138:995
98.199.70.195:443
5.14.187.133:443
120.147.65.97:2222
213.31.203.38:2222
89.43.136.239:443
188.25.237.208:443
94.53.92.42:443
67.8.103.21:443
93.118.88.61:443
79.115.211.4:2222
76.30.66.244:443
97.127.144.203:2222
97.81.255.189:443
206.255.163.120:443
66.222.88.126:995
24.90.160.91:443
95.76.27.89:443
209.182.121.133:2222
86.126.232.178:443
96.35.170.82:2222
5.182.39.156:443
67.131.59.17:443
72.142.106.198:465
95.77.144.238:443
67.250.184.157:443
68.225.250.136:443
24.110.96.149:443
71.187.170.235:443
77.159.149.74:443
188.173.185.139:443
68.98.142.248:443
100.1.239.189:443
74.135.85.117:443
75.110.250.89:443
24.184.5.251:2222
172.87.134.226:443
5.12.220.0:443
201.209.1.4:2078
71.217.112.41:2222
173.22.120.11:2222
79.113.218.134:443
47.153.115.154:995
70.57.15.187:993
72.190.124.29:443
173.3.132.17:995
23.24.115.181:443
24.229.245.124:995
47.205.231.60:443
72.142.106.198:995
75.111.145.5:443
216.201.162.158:443
98.197.254.40:443
85.7.22.186:2222
24.46.40.189:2222
24.202.42.48:2222
108.54.103.234:443
68.116.183.68:443
70.74.159.126:2222
79.114.194.106:443
69.92.54.95:995
98.199.150.30:443
98.219.77.197:443
69.254.141.249:443
70.124.29.226:443
79.78.131.124:443
74.33.70.30:443
71.182.142.63:443
89.32.154.226:443
72.38.44.119:995
49.191.9.180:995
79.115.4.88:443
47.153.115.154:443
108.27.217.44:443
71.77.252.14:2222
46.153.111.112:995
188.173.70.18:443
187.19.151.218:995
100.38.123.22:443
72.16.212.107:465
65.131.79.162:995
65.96.36.157:443
24.61.47.73:443
73.192.209.168:443
93.114.89.119:995
71.58.21.235:443
68.174.9.179:443
73.137.187.150:443
71.178.38.101:443
50.29.181.193:995
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b70799c95dd29b4f2d5be5bc7feecf34_JaffaCakes118
Files
-
b70799c95dd29b4f2d5be5bc7feecf34_JaffaCakes118.exe windows:5 windows x86 arch:x86
3f77a9c8f34dfaf6c90a2696beb06168
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
GetUserProfileDirectoryW
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
CoSetProxyBlanket
CoInitialize
CoInitializeSecurity
shell32
CommandLineToArgvW
ShellExecuteW
SHGetFolderPathW
setupapi
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
kernel32
lstrcatA
CreateDirectoryA
GetProcAddress
LoadLibraryA
lstrcmpiW
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetEnvironmentVariableW
CreateFileA
SetFilePointer
lstrlenA
lstrcpynA
GetCurrentProcess
FormatMessageA
WriteFile
WideCharToMultiByte
GetEnvironmentVariableA
MultiByteToWideChar
lstrlenW
GetLocalTime
GetModuleFileNameA
lstrcatW
GetCurrentThreadId
OutputDebugStringA
lstrcpyA
HeapAlloc
HeapFree
HeapCreate
VirtualAlloc
GetFileSize
lstrcmpiA
CreateEventA
LoadResource
SizeofResource
GetThreadContext
GetModuleHandleW
LoadLibraryW
TerminateProcess
DeleteFileW
ResumeThread
ExpandEnvironmentStringsW
GetComputerNameW
GetVolumeInformationW
ReleaseMutex
GetExitCodeProcess
GetSystemTimeAsFileTime
SetEnvironmentVariableW
GetTickCount
GetModuleFileNameW
CopyFileW
SetEnvironmentVariableA
GetVersionExA
GetWindowsDirectoryW
SetEvent
OpenEventA
CreateMutexA
TerminateThread
CreateThread
GetCurrentThread
LocalAlloc
GetFileAttributesA
GetFileAttributesW
LocalFree
lstrcpyW
CreateDirectoryW
SleepEx
WaitForSingleObject
FreeLibrary
GetDriveTypeW
lstrcmpA
GetCommandLineW
ExitProcess
lstrcpynW
Sleep
GetLastError
SystemTimeToFileTime
GetSystemTime
FindResourceA
GetSystemInfo
user32
GetForegroundWindow
MessageBoxA
CharUpperBuffA
GetClassNameA
CharUpperBuffW
advapi32
RegQueryInfoKeyW
LookupAccountSidW
ConvertSidToStringSidA
CreateProcessAsUserW
LookupAccountNameW
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
RegSetValueExW
RegQueryValueExW
SetFileSecurityW
SetSecurityDescriptorDacl
RegDeleteValueW
RegEnumValueW
RegOpenKeyExW
RegCloseKey
OpenProcessToken
GetSidSubAuthority
OpenThreadToken
GetSidSubAuthorityCount
GetTokenInformation
InitializeSecurityDescriptor
EqualSid
SetServiceStatus
msvcrt
strchr
memcpy
memset
_vsnwprintf
_vsnprintf
strncpy
_except_handler3
_ltoa
netapi32
NetApiBufferFree
NetUserEnum
NetGetDCName
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ