G:\projects\funny\CQXZS\org\传奇DPK\bin\DPK.pdb
Static task
static1
Behavioral task
behavioral1
Sample
73a3afc0989a67195071b3efb1ad2dbb_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73a3afc0989a67195071b3efb1ad2dbb_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
73a3afc0989a67195071b3efb1ad2dbb_JaffaCakes118
-
Size
3.7MB
-
MD5
73a3afc0989a67195071b3efb1ad2dbb
-
SHA1
f0476fadf9973d1760c28e0d9c270f27ecb2c08e
-
SHA256
ee4c42cea2bec3bd2282fa0ccbc213ccfbfa10bed5ea386e7b30fcd4fe9d91d7
-
SHA512
764508160c638513542a18198970bc87ef52a7b4cee0ac933c0efd18d7968dc4bb16e5aaa02b56b3c45080fa0d191f0d12475b4159305ff3c8c960d2a2736ecb
-
SSDEEP
98304:8q6V5E7S7ERtuG7gvNmwmGh3oUPRM/+XiET6DM4xfeUDj9nZm2o7YGMb48q2r2Gh:8q6V5Ef7gEjGG82feU47MEeA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73a3afc0989a67195071b3efb1ad2dbb_JaffaCakes118
Files
-
73a3afc0989a67195071b3efb1ad2dbb_JaffaCakes118.dll windows:5 windows x86 arch:x86
1ae3a51f1ca76447bcb911c9dd652ee2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
WSASetLastError
gethostname
ioctlsocket
listen
accept
recvfrom
sendto
getaddrinfo
freeaddrinfo
connect
socket
closesocket
getpeername
getsockopt
htons
bind
ntohs
__WSAFDIsSet
WSAGetLastError
select
recv
send
getsockname
setsockopt
WSAIoctl
WSAStartup
WSACleanup
winmm
PlaySoundA
wldap32
ord27
ord301
ord33
ord200
ord79
ord35
ord32
ord41
ord26
ord50
ord60
ord143
ord211
ord22
ord46
ord30
kernel32
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
VirtualAlloc
CreateThread
GetCurrentProcessId
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
GetVersionExA
IsWow64Process
GetCurrentProcess
GetModuleHandleA
GetProcAddress
Sleep
TerminateThread
OpenFileMappingA
MapViewOfFile
GetTickCount
OutputDebugStringA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
LoadLibraryA
CreateEventA
SetEvent
ResetEvent
WaitForSingleObject
ExitProcess
VirtualQueryEx
GetModuleFileNameA
VirtualFree
GetCurrentThreadId
FindFirstFileA
FindNextFileA
FindClose
CreateDirectoryA
GetLastError
CopyFileA
FreeLibrary
GetFileSize
ReadFile
SetFilePointer
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
SleepEx
VerifyVersionInfoA
VerSetConditionMask
FormatMessageA
PeekNamedPipe
WaitForMultipleObjects
GetFileType
GetStdHandle
ExpandEnvironmentStringsA
GetFullPathNameA
FlushFileBuffers
SetStdHandle
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetStartupInfoW
SetHandleCount
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapSize
GetLocaleInfoW
HeapDestroy
HeapCreate
GetModuleFileNameW
GetModuleHandleW
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
LCMapStringW
RaiseException
FindFirstFileExA
GetDriveTypeA
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitThread
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
HeapFree
HeapAlloc
WriteFile
CreateFileA
VirtualProtect
VirtualQuery
GetCurrentDirectoryW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
WriteConsoleW
LoadLibraryW
CompareStringW
GetExitCodeProcess
SetEnvironmentVariableA
GetDriveTypeW
SetEndOfFile
GetProcessHeap
CreateFileW
LoadLibraryExA
CreateProcessA
DuplicateHandle
MoveFileA
DeleteFileA
GetTimeFormatA
GetDateFormatA
CreatePipe
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
SystemTimeToFileTime
MulDiv
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
LockResource
SizeofResource
FreeResource
LoadResource
FindResourceA
GetACP
GetCurrentDirectoryA
user32
MoveWindow
VkKeyScanA
KillTimer
GetParent
IsWindowVisible
PostQuitMessage
SetWindowRgn
GetWindowRect
ScreenToClient
IsIconic
MonitorFromWindow
GetMonitorInfoA
FillRect
CallWindowProcA
GetWindowThreadProcessId
CharLowerA
SetWindowLongA
GetWindowLongA
CharUpperA
CallNextHookEx
SetWindowsHookExA
MessageBoxA
GetClientRect
GetWindowTextA
TranslateMessage
GetClassNameA
EnumWindows
GetForegroundWindow
GetActiveWindow
WindowFromPoint
GetWindow
SendMessageA
GetKeyState
SetTimer
IsWindow
wsprintfA
SendInput
SetCursorPos
ClientToScreen
keybd_event
PostMessageA
MapVirtualKeyA
ReleaseDC
GetDC
CreateAcceleratorTableA
InvalidateRgn
GetSysColor
SetCaretPos
ShowCaret
HideCaret
CreateCaret
SetRect
CharPrevA
DrawTextA
ReleaseCapture
SetCapture
GetFocus
GetUpdateRect
BeginPaint
EndPaint
DestroyWindow
PtInRect
IntersectRect
SetCursor
LoadCursorA
OffsetRect
CharNextA
wvsprintfA
DefWindowProcA
IsRectEmpty
ShowWindow
SetFocus
EnableWindow
SetWindowPos
SystemParametersInfoA
RegisterClassA
RegisterClassExA
GetClassInfoExA
GetPropA
SetPropA
SetWindowTextA
InvalidateRect
GetWindowTextLengthA
GetCursorPos
MapWindowPoints
CreateWindowExA
gdi32
GetTextExtentPoint32A
RoundRect
MoveToEx
GetCharABCWidthsA
SetBkColor
ExtTextOutA
SetStretchBltMode
CreateDIBSection
GetClipBox
ExtSelectClipRgn
SelectClipRgn
GetTextMetricsA
SaveDC
RestoreDC
SetWindowOrgEx
CreateFontIndirectA
StretchBlt
LineTo
TextOutA
SetBkMode
SetTextColor
CreatePen
SetPixel
CombineRgn
CreateRoundRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetObjectA
DeleteDC
GetDeviceCaps
Rectangle
advapi32
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
CryptHashData
CryptAcquireContextA
CryptCreateHash
shell32
DragFinish
DragQueryFileA
ntdll
RtlUnwind
NtQueryInformationThread
ole32
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
comctl32
ord17
_TrackMouseEvent
riched20
ord4
Sections
.text Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 380KB - Virtual size: 379KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 295KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ