C:\Users\Suheyl\Desktop\SLay\SuperNano50 1337 Base\Build\Release\Nano42.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Slay 1.5/Put the Slay folder into this folder.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Slay 1.5/Put the Slay folder into this folder.lnk
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Slay 1.5/Slay 1.5.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Slay 1.5/Slay 1.5.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Slay 1.5/Xenos.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Slay 1.5/Xenos.exe
Resource
win10v2004-20240508-en
General
-
Target
60b8f2ab7085abd4a37101e9a234f060_JaffaCakes118
-
Size
1.3MB
-
MD5
60b8f2ab7085abd4a37101e9a234f060
-
SHA1
1b14254b678056e553d0301a3d9a7a465c32a5ff
-
SHA256
6d34674c4383e4489f18514461142d8f9a77037c417eebcef55158a3951e0d76
-
SHA512
0146e6079557be2f80fb330e718050349de8023f1b7c2e83fdf78d7491c5150711f5dcd71611fa2203df5d9e7d21110721cb866c99a541458918acf943d8f1cd
-
SSDEEP
24576:ZnrQuTKAxK3J4SlcK5uDnorXrTWVu/SD2qWxeqk40QQS7F:B0uTzxK5aQuDOX7NAqyS7F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Slay 1.5/Slay 1.5.dll
Files
-
60b8f2ab7085abd4a37101e9a234f060_JaffaCakes118.rar
-
Slay 1.5/Put the Slay folder into this folder.lnk.lnk
-
Slay 1.5/Read Me.txt
-
Slay 1.5/Slay 1.5.dll.dll windows:6 windows x64 arch:x64
b69161ec053dafbc76117e7e17ef81a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
CreateThread
GetTickCount
GetModuleHandleA
ConvertThreadToFiber
SwitchToFiber
CreateFiber
VirtualQuery
Sleep
FreeLibraryAndExitThread
GetModuleFileNameA
OutputDebugStringA
ExitProcess
GetModuleHandleW
QueryPerformanceCounter
CloseHandle
HeapCreate
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
OpenThread
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualProtect
GetProcAddress
CreateToolhelp32Snapshot
Thread32First
Thread32Next
GetSystemInfo
VirtualAlloc
VirtualFree
RtlLookupFunctionEntry
InitializeSListHead
GetSystemTimeAsFileTime
IsDebuggerPresent
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlCaptureContext
user32
GetKeyState
MessageBoxA
GetAsyncKeyState
CallWindowProcW
SetWindowLongPtrW
FindWindowW
winmm
timeGetTime
msvcp140
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?uncaught_exception@std@@YA_NXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
?_Xbad_function_call@std@@YAXXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@M@Z
?_Xlength_error@std@@YAXPEBD@Z
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
vcruntime140
memset
__std_exception_copy
__std_exception_destroy
_CxxThrowException
__std_type_info_destroy_list
memcpy
__C_specific_handler
__std_terminate
memmove
__CxxFrameHandler3
api-ms-win-crt-runtime-l1-1-0
_invalid_parameter_noinfo_noreturn
exit
_initterm
_cexit
system
_initterm_e
_crt_atexit
_execute_onexit_table
_register_onexit_function
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
api-ms-win-crt-heap-l1-1-0
free
_callnewh
malloc
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf_s
fopen_s
__stdio_common_vfprintf_s
__stdio_common_vsprintf
__stdio_common_vsnprintf_s
fclose
api-ms-win-crt-time-l1-1-0
_localtime64_s
_time64
api-ms-win-crt-string-l1-1-0
strcat_s
_strdup
strcpy_s
api-ms-win-crt-convert-l1-1-0
atof
strtol
api-ms-win-crt-filesystem-l1-1-0
_stat64i32
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-utility-l1-1-0
srand
rand
api-ms-win-crt-math-l1-1-0
cos
round
sqrt
cosf
sin
sinf
Sections
.text Size: 429KB - Virtual size: 428KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 234KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Slay 1.5/Slay.log
-
Slay 1.5/SlayFolder/Slay.ytd
-
Slay 1.5/SlayFolder/sounds/will.wav
-
Slay 1.5/Social.txt
-
Slay 1.5/Xenos.exe.exe windows:6 windows x64 arch:x64
4a7ec7340da8cbdca5da87aee6d354fb
Code Sign
16:e9:b8:bb:70:0e:18:57:b2:b0:80:9d:3c:f1:51:35Certificate
IssuerCN=BlackBoneSPCNot Before12/09/2014, 10:21Not After31/12/2039, 23:59SubjectCN=BlackBoneSPC48:a8:c4:aa:ac:3e:e5:e3:a2:d4:e9:76:86:30:b4:49:15:ea:91:34Signer
Actual PE Digest48:a8:c4:aa:ac:3e:e5:e3:a2:d4:e9:76:86:30:b4:49:15:ea:91:34Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\Ton\Documents\Visual Studio 2015\Projects\Xenos\build\x64\Release\Xenos64.pdb
Imports
shlwapi
SHDeleteKeyW
SHSetValueW
dbghelp
MiniDumpWriteDump
kernel32
DeleteCriticalSection
CreateProcessW
GetCurrentProcess
GetModuleFileNameW
WaitForSingleObject
CreateFileW
GetCurrentThreadId
Sleep
CreateThread
GetLocalTime
ExitProcess
GetCurrentProcessId
SetUnhandledExceptionFilter
FlushFileBuffers
GetFileAttributesW
ResumeThread
SizeofResource
GetCommandLineW
WriteFile
LockResource
DeleteFileW
GetNativeSystemInfo
GetWindowsDirectoryW
FindResourceW
GetProcAddress
GetModuleHandleW
DecodePointer
RaiseException
CloseHandle
GetLastError
Wow64RevertWow64FsRedirection
InitializeCriticalSectionEx
Wow64DisableWow64FsRedirection
SetEndOfFile
ReadConsoleW
WriteConsoleW
HeapSize
SetStdHandle
FindNextFileW
FindFirstFileExW
FindClose
GetCommandLineA
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
GetProcessHeap
GetTimeZoneInformation
SetFilePointerEx
EnumSystemLocalesW
VirtualProtect
LoadResource
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
MultiByteToWideChar
FormatMessageW
LocalFree
WideCharToMultiByte
EnterCriticalSection
DeviceIoControl
LeaveCriticalSection
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualFree
VirtualAlloc
TerminateProcess
CreateToolhelp32Snapshot
Process32NextW
GetCurrentThread
Process32FirstW
GetExitCodeProcess
Thread32Next
Thread32First
InitializeCriticalSection
CreateActCtxW
GetTempPathW
UnmapViewOfFile
GetTempFileNameW
CreateFileMappingW
ReleaseActCtx
MapViewOfFile
ResetEvent
QueueUserAPC
GetTickCount
LoadLibraryW
FreeLibrary
ActivateActCtx
GetEnvironmentVariableW
GetSystemDirectoryW
DeactivateActCtx
Module32FirstW
GetCurrentDirectoryW
ReadFile
CreateNamedPipeW
TerminateThread
SuspendThread
GetExitCodeThread
GetThreadTimes
OpenThread
OpenProcess
IsWow64Process
WriteProcessMemory
VirtualProtectEx
GetThreadContext
VirtualAllocEx
ReadProcessMemory
CreateRemoteThread
VirtualFreeEx
SetThreadContext
VirtualQueryEx
GetSystemInfo
GetStringTypeW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
EncodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
OutputDebugStringW
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
GetVersionExW
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlPcToFileHeader
RtlUnwindEx
HeapAlloc
HeapFree
ExitThread
GetModuleHandleExW
HeapReAlloc
GetStdHandle
GetACP
GetFileType
GetConsoleCP
GetConsoleMode
GetDateFormatW
user32
DestroyIcon
LoadIconW
ChangeWindowMessageFilterEx
EnableMenuItem
wsprintfW
GetMessageW
CreateDialogParamW
CallWindowProcW
DestroyWindow
MessageBoxW
SetWindowLongPtrW
SendMessageW
EndDialog
SetWindowTextW
CreateWindowExW
ShowWindow
IsWindow
DispatchMessageW
IsDialogMessageW
TranslateAcceleratorW
TranslateMessage
SendMessageA
GetDlgItem
DialogBoxParamW
EnableWindow
GetWindowTextW
GetMenu
LoadAcceleratorsW
comdlg32
GetSaveFileNameW
GetOpenFileNameW
shell32
DragQueryFileW
CommandLineToArgvW
advapi32
RegOpenKeyW
SystemFunction036
RegEnumValueW
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
RegCreateKeyW
RegSetValueExW
RegCloseKey
OpenThreadToken
ole32
CoCreateInstance
CoUninitialize
CoInitialize
Sections
.text Size: 623KB - Virtual size: 623KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 311KB - Virtual size: 311KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ