Static task
static1
Behavioral task
behavioral1
Sample
private.gw/Xenos.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
private.gw/Xenos.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
private.gw/nowell.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
private.gw/nowell.dll
Resource
win10v2004-20240709-en
General
-
Target
5c16da23ff8d3fb35f0bea0200988957_JaffaCakes118
-
Size
406KB
-
MD5
5c16da23ff8d3fb35f0bea0200988957
-
SHA1
c34d49a26509b0941ab83d9b06b25ca6ca2bf439
-
SHA256
0089fcc1b2c30cc7ccd52ad29ec4ef2868e60aa3c0b9a74cddf7e6a98d340e87
-
SHA512
e432b9681c781c2c4c59ef621113df3aa35f9aee685efd7fac024db171d816aafb2d3535b4c3953883165940daaa27b7123cd614a7c7e67481d9ba55c35649ac
-
SSDEEP
12288:8XuEeN9wQwhh3vIJ+2GobDEBtqLoyurBDx3waOP:8XdIJG1BCDE0uhw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/private.gw/nowell.dll
Files
-
5c16da23ff8d3fb35f0bea0200988957_JaffaCakes118.rar
-
private.gw/Xenos.exe.exe windows:6 windows x86 arch:x86
b07b6057d36b6c728810f8349cbc1b1c
Code Sign
16:e9:b8:bb:70:0e:18:57:b2:b0:80:9d:3c:f1:51:35Certificate
IssuerCN=BlackBoneSPCNot Before12/09/2014, 10:21Not After31/12/2039, 23:59SubjectCN=BlackBoneSPC46:45:ac:f2:92:77:60:3e:66:8f:59:4f:a5:81:38:96:56:36:0a:04Signer
Actual PE Digest46:45:ac:f2:92:77:60:3e:66:8f:59:4f:a5:81:38:96:56:36:0a:04Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\Users\Ton\Documents\Visual Studio 2015\Projects\Xenos\build\Win32\Release\Xenos.pdb
Imports
shlwapi
SHDeleteKeyW
SHSetValueW
dbghelp
MiniDumpWriteDump
kernel32
CloseHandle
RaiseException
LoadResource
FindResourceW
DecodePointer
GetWindowsDirectoryW
GetProcAddress
DeleteCriticalSection
CreateProcessW
GetModuleHandleW
GetCurrentProcess
GetModuleFileNameW
WaitForSingleObject
GetCurrentThreadId
Sleep
CreateThread
GetLocalTime
ExitProcess
GetCurrentProcessId
SetUnhandledExceptionFilter
FlushFileBuffers
DeleteFileW
ResumeThread
GetCommandLineW
GetNativeSystemInfo
LockResource
GetLastError
Wow64RevertWow64FsRedirection
CreateFileW
InitializeCriticalSectionEx
Wow64DisableWow64FsRedirection
WriteFile
VirtualProtect
SetEndOfFile
ReadConsoleW
WriteConsoleW
HeapSize
SetStdHandle
FindNextFileW
FindFirstFileExW
FindClose
GetCommandLineA
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
GetProcessHeap
GetTimeZoneInformation
SetFilePointerEx
SizeofResource
GetFileAttributesW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
MultiByteToWideChar
FormatMessageW
LocalFree
WideCharToMultiByte
EnterCriticalSection
DeviceIoControl
LeaveCriticalSection
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualFree
VirtualAlloc
TerminateProcess
CreateToolhelp32Snapshot
Process32NextW
GetCurrentThread
Process32FirstW
GetExitCodeProcess
Thread32Next
Thread32First
InitializeCriticalSection
CreateActCtxW
GetTempPathW
UnmapViewOfFile
GetTempFileNameW
CreateFileMappingW
ReleaseActCtx
MapViewOfFile
ResetEvent
QueueUserAPC
GetTickCount
LoadLibraryW
FreeLibrary
ActivateActCtx
GetEnvironmentVariableW
GetSystemDirectoryW
DeactivateActCtx
Module32FirstW
GetCurrentDirectoryW
EncodeSystemPointer
ReadFile
CreateNamedPipeW
TerminateThread
SuspendThread
GetExitCodeThread
GetThreadTimes
OpenThread
OpenProcess
IsWow64Process
WriteProcessMemory
VirtualProtectEx
GetThreadContext
VirtualAllocEx
ReadProcessMemory
CreateRemoteThread
VirtualFreeEx
SetThreadContext
VirtualQueryEx
GetSystemInfo
GetStringTypeW
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
EncodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
SetEvent
IsDebuggerPresent
UnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InitializeSListHead
OutputDebugStringW
CreateTimerQueue
SignalObjectAndWait
SwitchToThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
GetVersionExW
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
RtlUnwind
HeapAlloc
HeapFree
ExitThread
GetModuleHandleExW
HeapReAlloc
GetStdHandle
GetACP
GetFileType
GetConsoleCP
GetConsoleMode
GetDateFormatW
GetTimeFormatW
user32
DestroyIcon
LoadIconW
ChangeWindowMessageFilterEx
EnableMenuItem
wsprintfW
GetMessageW
CreateDialogParamW
CallWindowProcW
DestroyWindow
MessageBoxW
SendMessageW
EndDialog
SetWindowTextW
LoadAcceleratorsW
CreateWindowExW
IsWindow
DispatchMessageW
IsDialogMessageW
TranslateAcceleratorW
TranslateMessage
SendMessageA
SetWindowLongW
GetDlgItem
DialogBoxParamW
EnableWindow
GetWindowTextW
GetMenu
ShowWindow
comdlg32
GetSaveFileNameW
GetOpenFileNameW
shell32
DragQueryFileW
CommandLineToArgvW
advapi32
RegCreateKeyW
SystemFunction036
RegEnumValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AdjustTokenPrivileges
RegOpenKeyW
LookupPrivilegeValueW
RegSetValueExW
RegCloseKey
OpenThreadToken
OpenProcessToken
ole32
CoCreateInstance
CoUninitialize
CoInitialize
Sections
.text Size: 580KB - Virtual size: 579KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 316KB - Virtual size: 316KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
private.gw/Xenos.log
-
private.gw/XenosCurrentProfile.xpr
-
private.gw/nowell.dll.dll windows:6 windows x86 arch:x86
0df5889757c55de66961a5facc1559ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
C:\Users\Grab\Desktop\Obstler\Obstler\Release\public_obstler.pdb
Imports
kernel32
Sleep
CreateThread
GetModuleHandleA
GetPrivateProfileStringA
CreateFileW
CloseHandle
WriteConsoleW
SetLastError
VirtualProtect
FlushInstructionCache
GetCurrentProcess
FreeLibrary
GetProcAddress
VirtualQuery
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
GetLastError
GetModuleFileNameW
InterlockedFlushSList
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetACP
GetStdHandle
GetFileType
GetStringTypeW
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
SetStdHandle
HeapSize
HeapReAlloc
WriteFile
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FlushFileBuffers
DecodePointer
user32
mouse_event
GetAsyncKeyState
d3dx9_38
D3DXAssembleShader
D3DXCreateFontA
D3DXCreateLine
advapi32
SystemFunction036
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ