D:\Anchor\x64\Debug\Anchor_x64.pdb
Behavioral task
behavioral1
Sample
d23b32b5d9a1ddb4dace9c7f94f2c36b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
d23b32b5d9a1ddb4dace9c7f94f2c36b_JaffaCakes118
-
Size
272KB
-
MD5
d23b32b5d9a1ddb4dace9c7f94f2c36b
-
SHA1
46c595e580719a4c54f55b4041f81d6e50ab4062
-
SHA256
3c26dd6817e143a4dd61ba134f037537da27d5df532840b721a5656e29111690
-
SHA512
e1c7498f1a53d4280814e9e59cbbb33228261185c48289c16b554f3139a1404814fe1acd699f6899a0a2933781e87c7c54dea7a7d83a12edd71e46a14a5ed19d
-
SSDEEP
3072:s/YfCR8cbcx0zQUeGMw70JXiRdTqltV4JNyK5n8Q3nT:sgflCcx0zQC70A+VayKn3nT
Malware Config
Signatures
-
Anchordns family
-
Detected AnchorDNS Backdoor 1 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule sample family_anchor_dns -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d23b32b5d9a1ddb4dace9c7f94f2c36b_JaffaCakes118
Files
-
d23b32b5d9a1ddb4dace9c7f94f2c36b_JaffaCakes118.exe windows:6 windows x64 arch:x64
8db6cf2ede2b203104185a1388b19a7b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetProcAddress
LoadLibraryA
WideCharToMultiByte
CloseHandle
SetEvent
WaitForSingleObject
CreateEventW
EnterCriticalSection
LeaveCriticalSection
ReleaseMutex
InitializeCriticalSection
DeleteCriticalSection
lstrlenW
CreateFileA
GetModuleHandleA
DeleteFileA
DeleteFileW
ReadFile
WriteFile
GetTempPathA
GetTempFileNameA
TerminateThread
CreateProcessW
GetSystemWindowsDirectoryA
GetSystemWindowsDirectoryW
GetShortPathNameA
MultiByteToWideChar
SetFilePointer
GetSystemTimeAsFileTime
FreeLibrary
GetComputerNameExW
GetTickCount
GetCurrentProcess
GetLastError
CreateFileW
CreateDirectoryA
GetCurrentProcessId
QueryPerformanceCounter
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
GetStartupInfoW
RaiseException
IsDebuggerPresent
GetModuleHandleW
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCurrentThreadId
InitializeSListHead
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SetServiceStatus
RegisterServiceCtrlHandlerW
RegSetValueExW
msvcp140d
?_Xlength_error@std@@YAXPEBD@Z
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
ws2_32
sendto
closesocket
connect
ioctlsocket
htons
inet_addr
setsockopt
shutdown
socket
WSAStartup
WSACleanup
WSAGetLastError
WSAPoll
__WSAFDIsSet
inet_ntoa
ntohs
recvfrom
select
winhttp
WinHttpCloseHandle
WinHttpAddRequestHeaders
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpOpenRequest
WinHttpOpen
WinHttpSetOption
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpConnect
rpcrt4
UuidCreate
RpcStringFreeA
UuidToStringA
vcruntime140d
__std_exception_destroy
__std_exception_copy
__C_specific_handler_noexcept
__vcrt_LoadLibraryExW
__std_type_info_destroy_list
__vcrt_GetModuleHandleW
__vcrt_GetModuleFileNameW
strrchr
__CxxFrameHandler3
memcmp
memcpy
memmove
memset
strchr
__C_specific_handler
wcschr
_CxxThrowException
ucrtbased
_seh_filter_dll
_configure_narrow_argv
_initialize_narrow_environment
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_crt_atexit
_crt_at_quick_exit
_cexit
terminate
strcpy_s
_seh_filter_exe
_set_app_type
__setusermatherr
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
_set_fmode
__p___argc
__p___argv
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
_free_dbg
_wmakepath_s
_wsplitpath_s
_invalid_parameter
malloc
_CrtDbgReportW
__stdio_common_vswprintf_s
_wtol
_wcsnicmp
_beginthreadex
atol
wcsncmp
wcslen
wcscmp
wcscpy_s
wcscat_s
_ltoa_s
rand
srand
strlen
strcat_s
_errno
__stdio_common_vsprintf_s
_CrtDbgReport
_invalid_parameter_noinfo
_callnewh
Exports
Exports
ServiceMain
SvchostPushServiceGlobals
Sections
.textbss Size: - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.msvcjmc Size: 1024B - Virtual size: 703B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 283B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ