Static task
static1
Behavioral task
behavioral1
Sample
3d Lines v1.2 Crack.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3d Lines v1.2 Crack.exe
Resource
win10v2004-20240508-en
General
-
Target
4ccd4fc56552463e709418059fe8c642_JaffaCakes118
-
Size
18KB
-
MD5
4ccd4fc56552463e709418059fe8c642
-
SHA1
335c8d4685bf1ebe81ace7ef5c1216b33e2c1f4d
-
SHA256
f5c44ac670762b00124d665c9152d89b89f984d156b5e26d33167290f162ceec
-
SHA512
729f44ecabc8082c043f06c9d7e48a1aa3268e2d2d2c54aff04a69ff5ad575ea4ae3ff24f7dab67cbbd94b777d5724a000bea1fe9246e8a852a6f57f2267e429
-
SSDEEP
384:P6gs1s4iSutvaXMTsksO3E5LATaX+St+5ndtKR:P6TijXD3E5IaV+Xto
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3d Lines v1.2 Crack.exe
Files
-
4ccd4fc56552463e709418059fe8c642_JaffaCakes118.zip
-
3d Lines v1.2 Crack.exe.exe windows:1 windows x86 arch:x86
a7add1f2929975ef98ba18acb8fcf5c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
user32
DispatchMessageA
TranslateMessage
GetDlgItem
EndDialog
DefWindowProcA
LoadIconA
IsDialogMessageA
GetDlgItemTextA
GetCursor
FillRect
MessageBeep
DialogBoxParamA
CreateDialogParamA
CharUpperA
SendDlgItemMessageA
LoadCursorA
GetSysColorBrush
GetMessageA
SetCursor
GetDC
SetWindowTextA
GetClientRect
SetDlgItemTextA
PostQuitMessage
RegisterClassExA
ReleaseDC
SetWindowLongA
MessageBoxA
SetWindowPos
CheckDlgButton
wsprintfA
kernel32
CopyFileA
SetFileAttributesA
SetCurrentDirectoryA
GetDriveTypeA
ReadFile
GetCurrentDirectoryA
GetModuleHandleA
ExitProcess
GetLogicalDriveStringsA
lstrcmp
WriteFile
GetFileTime
SetUnhandledExceptionFilter
SetLastError
GetFileSize
SetFileTime
CloseHandle
GetFileAttributesA
SetFilePointer
CreateFileA
gdi32
TextOutA
SetTextColor
SetBkMode
SelectObject
GetStockObject
GetObjectA
CreateFontIndirectA
shell32
SHBrowseForFolder
DragQueryFile
DragAcceptFiles
ShellExecuteA
SHGetPathFromIDList
SHGetMalloc
imagehlp
SearchTreeForFile
Sections
CODE Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PATCH Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
File_id.diz
-
keygen.nfo
-
release.nfo