Static task
static1
Behavioral task
behavioral1
Sample
2024-07-10_2728c77bb2161634d4d69e794896352d_jaff.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-10_2728c77bb2161634d4d69e794896352d_jaff.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_2728c77bb2161634d4d69e794896352d_jaff
-
Size
25.0MB
-
MD5
2728c77bb2161634d4d69e794896352d
-
SHA1
af786aa3f4fed33863212f4452997d17fc460a1c
-
SHA256
50cafcaa6d71071667307efd1d362bbe48b6f2b91cbc268056940de741ace737
-
SHA512
d0f5d26b5866b2f41feb284498563e7cd09f8875a18604540284d6e7528a7ae1af7653f761c6b2d6eb65d135a381563ae4648a061992855024004d5846854a39
-
SSDEEP
196608:vkEkpvEKp7G4W4WyYdgOdsahgek32QN5KegkOeA4FEdn7DuJYjm:EEW7G4W4TYdgxGU5KefOY2dnvuSj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-10_2728c77bb2161634d4d69e794896352d_jaff
Files
-
2024-07-10_2728c77bb2161634d4d69e794896352d_jaff.exe windows:6 windows x64 arch:x64
3bc3ecbd9e7ff1a36d60f9a2175c36f7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
AdjustTokenPrivileges
CreateWellKnownSid
DeregisterEventSource
GetTokenInformation
GetWindowsAccountDomainSid
ImpersonateLoggedOnUser
LookupPrivilegeValueW
OpenProcessToken
OpenThreadToken
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
RegisterEventSourceW
ReportEventW
RevertToSelf
bcrypt
BCryptImportKey
BCryptGenerateKeyPair
BCryptOpenAlgorithmProvider
BCryptHashData
BCryptGetProperty
BCryptSetProperty
BCryptGenRandom
BCryptCloseAlgorithmProvider
BCryptCreateHash
BCryptDecrypt
BCryptDestroyHash
BCryptVerifySignature
BCryptFinishHash
BCryptEncrypt
BCryptExportKey
BCryptImportKeyPair
BCryptFinalizeKeyPair
BCryptDestroyKey
crypt32
PFXImportCertStore
PFXExportCertStore
CryptQueryObject
CryptMsgGetParam
CryptMsgClose
CryptImportPublicKeyInfoEx2
CryptFormatObject
CryptFindOIDInfo
CryptDecodeObject
CertVerifyTimeValidity
CertVerifyCertificateChainPolicy
CertSetCertificateContextProperty
CertSerializeCertificateStoreElement
CertSaveStore
CertOpenStore
CertNameToStrW
CertGetValidUsages
CertGetNameStringW
CertGetIntendedKeyUsage
CertAddCertificateContextToStore
CertAddCertificateLinkToStore
CertCloseStore
CertControlStore
CertCreateCertificateChainEngine
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFindExtension
CertFreeCertificateChain
CertFreeCertificateChainEngine
CertFreeCertificateContext
CertGetCertificateChain
CertGetCertificateContextProperty
iphlpapi
GetNetworkParams
GetAdaptersAddresses
GetPerAdapterInfo
if_nametoindex
kernel32
IsProcessorFeaturePresent
InitializeSListHead
RtlUnwindEx
SetUnhandledExceptionFilter
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
UnhandledExceptionFilter
RtlLookupFunctionEntry
GetProcessHeap
HeapFree
RtlPcToFileHeader
HeapAlloc
CancelIoEx
CancelSynchronousIo
CancelThreadpoolIo
CheckRemoteDebuggerPresent
CloseHandle
CloseThreadpoolIo
CloseThreadpoolWait
CloseThreadpoolWork
ConnectNamedPipe
CreateEventExW
CreateFileW
CreateIoCompletionPort
CreateNamedPipeW
CreateProcessA
CreateThread
CreateThreadpoolIo
CreateThreadpoolTimer
CreateThreadpoolWait
CreateThreadpoolWork
DeleteCriticalSection
DeleteFileW
DeviceIoControl
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FileTimeToSystemTime
FindClose
FindFirstFileExW
FlushFileBuffers
FlushInstructionCache
FormatMessageW
FreeLibrary
GetCPInfo
GetCPInfoExW
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentProcessorNumberEx
GetCurrentThread
GetCurrentThreadId
GetDynamicTimeZoneInformation
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesExW
GetFileInformationByHandleEx
GetFileType
GetFullPathNameW
GetLastError
GetLocaleInfoEx
GetLongPathNameW
GetModuleFileNameW
GetOverlappedResult
GetProcAddress
GetProcessId
GetStdHandle
GetSystemTime
GetThreadPriority
GetTickCount64
GetTimeZoneInformation
InitializeConditionVariable
InitializeCriticalSection
IsDebuggerPresent
IsWow64Process
K32EnumProcessModulesEx
K32EnumProcesses
K32GetModuleBaseNameW
K32GetModuleFileNameExW
K32GetModuleInformation
LeaveCriticalSection
LoadLibraryExW
LocalAlloc
LocalFree
MultiByteToWideChar
OpenProcess
OpenThread
QueryFullProcessImageNameW
QueryPerformanceCounter
QueryPerformanceFrequency
QueryUnbiasedInterruptTime
RaiseFailFastException
ReadConsoleW
ReadFile
ReadProcessMemory
ResetEvent
ResumeThread
SetConsoleTextAttribute
SetEvent
SetFileInformationByHandle
SetLastError
SetThreadErrorMode
SetThreadPriority
SetThreadpoolTimer
SetThreadpoolWait
Sleep
SleepConditionVariableCS
StartThreadpoolIo
SubmitThreadpoolWork
SystemTimeToFileTime
TerminateProcess
TzSpecificLocalTimeToSystemTime
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualProtectEx
VirtualQueryEx
WaitForMultipleObjectsEx
WaitForSingleObject
WaitForThreadpoolWaitCallbacks
WakeConditionVariable
WideCharToMultiByte
WriteConsoleW
WriteFile
WriteProcessMemory
FlushProcessWriteBuffers
WaitForSingleObjectEx
RtlVirtualUnwind
RtlCaptureContext
RtlRestoreContext
VerSetConditionMask
AddVectoredExceptionHandler
FlsAlloc
FlsGetValue
FlsSetValue
CreateEventW
SwitchToThread
SuspendThread
GetThreadContext
SetThreadContext
QueryInformationJobObject
GetModuleHandleW
GetModuleHandleExW
GetProcessAffinityMask
VerifyVersionInfoW
InitializeContext
GetEnabledXStateFeatures
SetXStateFeaturesMask
VirtualQuery
GetSystemTimeAsFileTime
InitializeCriticalSectionEx
DebugBreak
SleepEx
SetThreadIdealProcessorEx
GetThreadIdealProcessorEx
GlobalMemoryStatusEx
GetSystemInfo
GetLogicalProcessorInformation
GetLogicalProcessorInformationEx
GetLargePageMinimum
VirtualUnlock
VirtualAllocExNuma
IsProcessInJob
GetNumaHighestNodeNumber
GetProcessGroupAffinity
SetThreadGroupAffinity
SetThreadAffinityMask
GetNumaProcessorNodeEx
K32GetProcessMemoryInfo
EncodePointer
DecodePointer
HeapCreate
HeapDestroy
ncrypt
NCryptFreeObject
NCryptGetProperty
NCryptImportKey
NCryptOpenKey
NCryptOpenStorageProvider
NCryptSetProperty
NCryptDeleteKey
ole32
CoCreateGuid
CoGetApartmentType
CoInitializeEx
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoWaitForMultipleHandles
version
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
VerQueryValueW
ws2_32
WSARecv
shutdown
WSAIoctl
setsockopt
send
select
WSASend
ioctlsocket
WSAGetOverlappedResult
WSAEventSelect
getsockopt
WSAConnect
WSACleanup
getpeername
closesocket
WSASocketW
WSAStartup
recv
FreeAddrInfoW
FreeAddrInfoExW
GetNameInfoW
GetAddrInfoExW
GetAddrInfoW
bind
api-ms-win-crt-heap-l1-1-0
_set_new_mode
_callnewh
free
calloc
malloc
api-ms-win-crt-math-l1-1-0
modf
sqrt
floor
__setusermatherr
pow
round
ceil
api-ms-win-crt-string-l1-1-0
strcpy_s
wcsncmp
strcmp
_stricmp
api-ms-win-crt-convert-l1-1-0
strtoull
strtoul
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
_register_thread_local_exe_atexit_callback
_c_exit
_cexit
__p___wargv
__p___argc
abort
_exit
terminate
_configure_wide_argv
exit
_initterm_e
_initterm
_get_initial_wide_environment
_initialize_wide_environment
_crt_atexit
_set_app_type
_seh_filter_exe
_initialize_onexit_table
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 708KB - Virtual size: 707KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.managed Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
hydrated Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 19.6MB - Virtual size: 19.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 447KB - Virtual size: 447KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ