c:\views\bonjour\Bonjour.proj\projectfiles\sandbox\mDNSWindows\SystemService\Release\mDNSResponder.pdb
Behavioral task
behavioral1
Sample
4db1c94661f37836c49779b07d8305a7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4db1c94661f37836c49779b07d8305a7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4db1c94661f37836c49779b07d8305a7_JaffaCakes118
-
Size
368KB
-
MD5
4db1c94661f37836c49779b07d8305a7
-
SHA1
ea2521c7195883bf4bcf80059721c119b75c62dc
-
SHA256
4063424c90e32679637091459f59eb0849b29056d7e997ba9833f9a438f8f84c
-
SHA512
0d1ca3973f3e1aa79b597ce7d9fcd67c7cb94ab91eadd0ab4d98126872781444a15e28a3e4e841a969c210009ff680cdc2f8c4e9f0c78252110a7bd72a6c67f0
-
SSDEEP
6144:6nvaAaS9cvUt34toJ2kc2+X8M9gVWooJbkaIkcEEKx8XLQH4C89TUYrs:Ka7QcknM9gV1OiEEO8XLQ789oZ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4db1c94661f37836c49779b07d8305a7_JaffaCakes118
Files
-
4db1c94661f37836c49779b07d8305a7_JaffaCakes118.exe windows:4 windows x86 arch:x86
af6d1a2df0a05a00fc187179484e758b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
WSAGetLastError
sendto
recv
send
closesocket
bind
setsockopt
socket
recvfrom
WSAStringToAddressA
htons
listen
accept
shutdown
inet_addr
WSAStartup
getsockname
WSACleanup
WSAIoctl
ioctlsocket
connect
WSAEventSelect
htonl
iphlpapi
GetIpAddrTable
GetNetworkParams
GetPerAdapterInfo
GetAdaptersInfo
GetBestInterface
CreateIpForwardEntry
DeleteIpForwardEntry
GetIpForwardTable
kernel32
EnterCriticalSection
LeaveCriticalSection
SetEvent
GetCurrentThreadId
GetTickCount
DeleteCriticalSection
CloseHandle
GetComputerNameExA
WaitForSingleObject
WideCharToMultiByte
MultiByteToWideChar
CreateEventW
GlobalFree
GlobalAlloc
GetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
WaitForMultipleObjects
InterlockedDecrement
GetModuleFileNameW
GetFullPathNameW
ResumeThread
SetConsoleCtrlHandler
GetModuleHandleW
FormatMessageA
GetCommandLineA
GetEnvironmentStringsW
Sleep
GetCommandLineW
InterlockedExchange
VirtualQuery
LoadLibraryA
SetFilePointer
SetStdHandle
GetLocaleInfoA
GetCPInfo
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
HeapSize
RaiseException
lstrlenA
LocalFree
InitializeCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
LCMapStringW
HeapAlloc
HeapFree
ExitProcess
GetSystemTimeAsFileTime
HeapReAlloc
ExitThread
CreateThread
RtlUnwind
GetModuleHandleA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
QueryPerformanceCounter
GetCurrentProcessId
GetModuleFileNameA
WriteFile
FlushFileBuffers
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
TerminateProcess
GetCurrentProcess
LCMapStringA
user32
LoadStringW
advapi32
SetServiceStatus
RegisterServiceCtrlHandlerExW
DeregisterEventSource
StartServiceCtrlDispatcherW
QueryServiceStatus
ControlService
DeleteService
CreateServiceW
StartServiceW
RegisterEventSourceW
ReportEventA
LockServiceDatabase
OpenServiceW
ChangeServiceConfig2W
UnlockServiceDatabase
OpenSCManagerW
EnumServicesStatusW
CloseServiceHandle
RegOpenKeyExW
RegCreateKeyA
LsaOpenPolicy
LsaNtStatusToWinError
LsaRetrievePrivateData
LsaFreeMemory
LsaClose
RegQueryInfoKeyW
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegNotifyChangeKeyValue
RegCreateKeyW
RegSetValueExW
RegCloseKey
ole32
CoInitializeEx
CoSetProxyBlanket
CoInitializeSecurity
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysStringLen
SysFreeString
Sections
.text Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
UPX0 Size: 144KB - Virtual size: 380KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE