G:\projects\funny\CQXZS\org\传奇DPK\bin\DPK.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fccf9605c86dcc0511d4f7379b8f4265_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fccf9605c86dcc0511d4f7379b8f4265_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fccf9605c86dcc0511d4f7379b8f4265_JaffaCakes118
-
Size
3.4MB
-
MD5
fccf9605c86dcc0511d4f7379b8f4265
-
SHA1
2a527c96df2d939be8a159f28eea3a160418817f
-
SHA256
360ebfa4622267ab664dcdba2280489580a33af46669f194410432702be95c4b
-
SHA512
a7bb30e0f77a80de0a338e5ca4096c71a1ccf3f0267f70db60f734cdad80b0412cc4156f2da66a91738031f4bed63c469f2cae897fc789fd6dff5c5e4a6a8f62
-
SSDEEP
98304:L+602hVmmrydN0O9PFYonUwVx9X12P6S4nMk9VJMnZCF9+oJWSL4wQgZoDMxXE6g:L+61hV8N0O9PFYonUwVx9X12P3bkDECz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fccf9605c86dcc0511d4f7379b8f4265_JaffaCakes118
Files
-
fccf9605c86dcc0511d4f7379b8f4265_JaffaCakes118.dll windows:5 windows x86 arch:x86
c3070e1f2cfc50ec64f1351c5b4c384c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
ws2_32
WSASetLastError
gethostname
ioctlsocket
listen
accept
recvfrom
sendto
getaddrinfo
freeaddrinfo
connect
socket
closesocket
getpeername
getsockopt
htons
bind
ntohs
__WSAFDIsSet
WSAGetLastError
select
recv
send
getsockname
setsockopt
WSAIoctl
WSAStartup
WSACleanup
winmm
PlaySoundA
wldap32
ord27
ord301
ord33
ord200
ord79
ord35
ord32
ord41
ord26
ord50
ord60
ord143
ord211
ord22
ord46
ord30
kernel32
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
VirtualAlloc
CreateThread
GetCurrentProcessId
CreateToolhelp32Snapshot
Thread32First
OpenThread
Thread32Next
GetVersionExA
IsWow64Process
GetCurrentProcess
GetModuleHandleA
GetProcAddress
Sleep
TerminateThread
OpenFileMappingA
MapViewOfFile
GetTickCount
OutputDebugStringA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
LoadLibraryA
CreateEventA
SetEvent
ResetEvent
WaitForSingleObject
ExitProcess
VirtualQueryEx
GetModuleFileNameA
VirtualFree
GetCurrentThreadId
FindFirstFileA
FindNextFileA
CreateDirectoryA
FindClose
GetLastError
CopyFileA
FreeLibrary
SetFilePointer
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
SleepEx
VerifyVersionInfoA
VerSetConditionMask
FormatMessageA
ReadFile
PeekNamedPipe
WaitForMultipleObjects
GetFileType
GetStdHandle
ExpandEnvironmentStringsA
GetFullPathNameA
FlushFileBuffers
SetStdHandle
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetStartupInfoW
SetHandleCount
IsValidCodePage
GetOEMCP
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
HeapSize
GetLocaleInfoW
HeapDestroy
HeapCreate
GetModuleFileNameW
GetModuleHandleW
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
LCMapStringW
RaiseException
FindFirstFileExA
GetDriveTypeA
GetFileInformationByHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitThread
GetCommandLineA
GetSystemTimeAsFileTime
HeapReAlloc
HeapFree
HeapAlloc
WriteFile
CreateFileA
VirtualProtect
VirtualQuery
GetCurrentDirectoryW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
WriteConsoleW
LoadLibraryW
CompareStringW
SetEnvironmentVariableA
GetExitCodeProcess
GetDriveTypeW
SetEndOfFile
GetProcessHeap
CreateFileW
LoadLibraryExA
CreateProcessA
DuplicateHandle
MoveFileA
DeleteFileA
GetTimeFormatA
GetDateFormatA
CreatePipe
SetFileTime
GetFileAttributesA
LocalFileTimeToFileTime
SystemTimeToFileTime
MulDiv
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EncodePointer
DecodePointer
LockResource
SizeofResource
FreeResource
LoadResource
FindResourceA
GetFileSize
GetACP
GetCurrentDirectoryA
user32
SetRect
VkKeyScanA
KillTimer
GetParent
IsWindowVisible
PostQuitMessage
SetWindowRgn
GetWindowRect
ScreenToClient
IsIconic
MonitorFromWindow
GetMonitorInfoA
FillRect
CallWindowProcA
GetWindowThreadProcessId
CharLowerA
SetWindowLongA
GetWindowLongA
CharUpperA
CallNextHookEx
SetWindowsHookExA
MessageBoxA
GetClientRect
GetWindowTextA
TranslateMessage
GetClassNameA
EnumWindows
GetForegroundWindow
GetActiveWindow
WindowFromPoint
GetWindow
GetKeyState
SetTimer
IsWindow
SendMessageA
wsprintfA
SendInput
SetCursorPos
ClientToScreen
keybd_event
PostMessageA
MapVirtualKeyA
ReleaseDC
GetDC
CharPrevA
DrawTextA
MoveWindow
CreateAcceleratorTableA
InvalidateRgn
GetSysColor
SetCaretPos
ShowCaret
HideCaret
CreateCaret
ReleaseCapture
SetCapture
GetFocus
GetUpdateRect
BeginPaint
EndPaint
IsRectEmpty
CharNextA
PtInRect
IntersectRect
SetCursor
LoadCursorA
OffsetRect
wvsprintfA
DefWindowProcA
MapWindowPoints
ShowWindow
SetFocus
EnableWindow
SetWindowPos
SystemParametersInfoA
RegisterClassA
RegisterClassExA
GetClassInfoExA
GetPropA
SetPropA
SetWindowTextA
InvalidateRect
GetWindowTextLengthA
GetCursorPos
DestroyWindow
CreateWindowExA
gdi32
GetTextExtentPoint32A
RoundRect
MoveToEx
GetCharABCWidthsA
SetBkColor
ExtTextOutA
SetStretchBltMode
CreateDIBSection
GetClipBox
ExtSelectClipRgn
SelectClipRgn
GetTextMetricsA
SaveDC
RestoreDC
SetWindowOrgEx
CreateFontIndirectA
StretchBlt
LineTo
TextOutA
SetBkMode
Rectangle
CreatePen
SetPixel
CombineRgn
CreateRoundRectRgn
CreateRectRgnIndirect
CreateSolidBrush
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetStockObject
GetObjectA
DeleteDC
GetDeviceCaps
SetTextColor
advapi32
CryptGetHashParam
CryptDestroyHash
CryptReleaseContext
CryptHashData
CryptAcquireContextA
CryptCreateHash
shell32
DragFinish
DragQueryFileA
ntdll
RtlUnwind
NtQueryInformationThread
ole32
OleLockRunning
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
comctl32
ord17
_TrackMouseEvent
riched20
ord4
Sections
.text Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 270KB - Virtual size: 289KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ