Behavioral task
behavioral1
Sample
f206d59c2c6a46adf7022dc11e76f23f_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
f206d59c2c6a46adf7022dc11e76f23f_JaffaCakes118
-
Size
221KB
-
MD5
f206d59c2c6a46adf7022dc11e76f23f
-
SHA1
ee79de19002f58a6a5469cdaef0885ac60e8017b
-
SHA256
91c6667107dd9a39df5f2547ae0a0eafee8b0c1214286103df81aec0b75eb9e3
-
SHA512
65118ec7d1ff39776810137b8fc68688dc524f2759688a2aa702be9e9c6e9bb01698801323afc6e7b5c522ee65e92441e8671db4cc6f6bc0be4cfa47f46032c7
-
SSDEEP
3072:+bfttg0spr28HIM0jLIyPm13vFjdaW9SNZyeNGdrBW/BXH6sVXqPKlTXYGbf8KFR:4fb0rHT6Vm1fuZTiIVH2KlTXYENQ
Malware Config
Extracted
qakbot
324.65
spx82
1584449336
98.213.28.175:443
72.209.191.27:443
100.37.33.10:443
70.62.160.186:6883
104.152.16.45:995
68.174.15.223:443
24.99.180.247:443
72.218.167.183:995
71.77.252.14:2222
104.34.122.18:443
176.205.145.81:995
73.163.242.114:443
73.214.231.2:443
83.66.111.85:443
35.142.24.147:2222
67.250.184.157:443
41.228.55.118:443
65.131.79.162:995
137.99.224.198:443
100.33.132.135:443
74.135.85.117:443
175.111.128.234:443
41.69.25.184:443
71.69.128.2:2222
67.251.155.12:443
179.36.4.69:443
68.82.125.234:443
177.54.136.34:443
151.243.156.188:995
97.78.107.14:995
81.245.66.237:995
50.108.212.180:443
47.153.115.154:993
65.185.84.240:443
184.21.151.81:995
207.119.226.80:443
67.131.59.17:443
182.56.134.44:995
72.29.181.77:2078
172.78.87.180:443
67.141.139.122:443
82.137.58.162:443
24.229.245.124:995
80.11.10.151:990
83.25.17.147:2222
206.255.163.120:443
5.182.39.156:443
24.32.119.146:443
98.219.77.197:443
210.61.141.92:443
100.40.48.96:443
80.195.103.146:2222
99.228.5.106:995
49.191.136.172:995
72.224.215.180:2222
108.189.242.241:443
64.19.74.29:995
59.94.165.110:443
201.152.172.26:995
23.24.115.181:443
206.169.163.147:995
72.80.137.215:443
50.29.166.232:995
72.90.243.117:443
108.12.211.218:443
100.38.164.182:443
72.190.101.70:443
142.255.99.254:443
175.111.128.234:995
184.191.62.24:995
68.96.122.189:2222
112.196.184.34:50010
41.97.154.81:443
74.75.237.11:443
87.201.206.22:443
141.193.83.107:443
70.95.94.91:2078
116.72.228.8:443
104.36.135.227:443
12.5.37.3:443
121.122.76.193:443
50.247.230.33:995
45.45.105.94:443
72.36.59.46:2222
173.173.68.41:443
72.16.212.107:465
74.5.149.16:0
108.190.148.31:2222
108.54.103.234:443
98.199.226.41:443
75.137.60.81:443
74.194.4.181:443
50.29.181.193:995
103.206.112.234:443
73.23.194.75:443
173.79.220.156:443
108.27.217.44:443
75.81.25.223:995
75.82.228.209:443
71.80.227.238:443
73.7.197.94:443
71.220.222.169:443
93.114.89.119:443
108.30.161.143:443
73.6.30.128:443
96.41.93.96:443
96.227.122.123:443
24.46.40.189:2222
173.175.29.210:443
47.205.150.29:443
173.3.132.17:995
91.75.21.18:443
24.210.45.215:443
152.208.21.141:995
108.227.161.27:443
173.22.120.11:2222
216.201.162.158:443
80.14.209.42:2222
70.164.39.91:443
47.41.3.57:443
72.38.44.119:995
47.136.224.60:443
188.27.17.115:443
108.49.221.180:443
68.113.208.193:443
71.29.145.48:443
24.107.199.192:443
174.82.131.155:995
96.243.35.201:443
173.172.205.216:443
67.209.195.198:3389
72.190.30.180:443
77.159.149.74:443
47.153.115.154:995
74.138.18.247:443
98.118.156.172:443
71.74.12.34:443
84.247.55.190:443
181.126.86.223:443
181.197.195.138:995
96.35.170.82:2222
75.131.239.76:995
68.224.192.39:443
47.202.98.230:443
47.187.141.144:443
47.26.35.113:443
72.190.124.29:443
86.125.134.232:995
68.61.163.191:443
70.124.29.226:443
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f206d59c2c6a46adf7022dc11e76f23f_JaffaCakes118
Files
-
f206d59c2c6a46adf7022dc11e76f23f_JaffaCakes118.exe windows:5 windows x86 arch:x86
3489ec6897bf25dd7f5d86ee09369d0d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
GetUserProfileDirectoryW
ole32
CoUninitialize
CoCreateInstance
CoInitializeEx
CoSetProxyBlanket
CoInitialize
CoInitializeSecurity
shell32
CommandLineToArgvW
ShellExecuteW
SHGetFolderPathW
setupapi
SetupDiGetClassDevsA
SetupDiGetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
kernel32
GetLastError
GetProcAddress
LoadLibraryA
lstrcmpiW
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetEnvironmentVariableW
lstrlenA
WideCharToMultiByte
lstrcatA
GetEnvironmentVariableA
MultiByteToWideChar
lstrlenW
lstrcatW
lstrcpyA
HeapAlloc
HeapFree
HeapCreate
VirtualAlloc
GetFileSize
lstrcmpiA
GetModuleFileNameA
FindResourceA
LoadResource
SizeofResource
GetThreadContext
CreateEventA
GetModuleHandleW
LoadLibraryW
TerminateProcess
DeleteFileW
ResumeThread
ExpandEnvironmentStringsW
GetComputerNameW
GetVolumeInformationW
ReleaseMutex
GetExitCodeProcess
GetSystemTimeAsFileTime
SetEnvironmentVariableW
GetTickCount
GetModuleFileNameW
GetSystemInfo
SetEnvironmentVariableA
GetVersionExA
CopyFileW
SetEvent
OpenEventA
CreateMutexA
TerminateThread
CreateThread
GetFileAttributesA
GetFileAttributesW
GetCurrentThread
LocalAlloc
GetLocalTime
LocalFree
lstrcpyW
CreateDirectoryW
SleepEx
WaitForSingleObject
FreeLibrary
GetDriveTypeW
lstrcmpA
GetCommandLineW
ExitProcess
lstrcpynW
Sleep
SystemTimeToFileTime
GetSystemTime
GetCurrentProcess
GetWindowsDirectoryW
user32
CharUpperBuffA
MessageBoxA
GetClassNameA
CharUpperBuffW
advapi32
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegQueryInfoKeyW
LookupAccountNameW
EqualSid
SetServiceStatus
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
RegSetValueExW
RegQueryValueExW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegCloseKey
SetFileSecurityW
OpenProcessToken
GetSidSubAuthority
OpenThreadToken
GetSidSubAuthorityCount
LookupAccountSidW
CreateProcessAsUserW
msvcrt
memcpy
memset
_vsnwprintf
_vsnprintf
_except_handler3
_ltoa
netapi32
NetApiBufferFree
NetUserEnum
NetGetDCName
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ