Overview
overview
8Static
static
7Crack/Crack.exe
windows7-x64
7Crack/Crack.exe
windows10-2004-x64
7Crack/Keygen.exe
windows7-x64
3Crack/Keygen.exe
windows10-2004-x64
3Crack/非�...��.url
windows7-x64
1Crack/非�...��.url
windows10-2004-x64
1mfx.exe
windows7-x64
8mfx.exe
windows10-2004-x64
8非常世�...��.url
windows7-x64
1非常世�...��.url
windows10-2004-x64
1Behavioral task
behavioral1
Sample
Crack/Crack.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Crack/Crack.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Crack/Keygen.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Crack/Keygen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Crack/非常世纪资源网.url
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Crack/非常世纪资源网.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
mfx.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
mfx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
非常世纪资源网.url
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
非常世纪资源网.url
Resource
win10v2004-20240802-en
General
-
Target
87b4a3ae34504952c4b00be3027bbe9f_JaffaCakes118
-
Size
1.5MB
-
MD5
87b4a3ae34504952c4b00be3027bbe9f
-
SHA1
0b00a5e837e9cc766f52508bad74f64a74410693
-
SHA256
695718581438e27bfda6cfec46303d6d56dd477a705e99017c13849c75859087
-
SHA512
70bbdc7588f25f17dbf699a7f48ed2c36622ad2a4064f3d0e965733a9020489711bf92c2b47e4749c6e6c04fba95806202d0833dd3173f31f43e4fc03ef8d89e
-
SSDEEP
24576:t/aICAgwZBn3u4BOy5cXqhJtjm6jmfbPis54XVGxdaTqLg7D35L:9aICZwZBndBC646y7cVGvIcgf35L
Malware Config
Signatures
-
resource yara_rule static1/unpack001/Crack/Crack.exe upx -
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/Crack/Crack.exe unpack002/out.upx unpack001/Crack/Keygen.exe unpack001/mfx.exe
Files
-
87b4a3ae34504952c4b00be3027bbe9f_JaffaCakes118.rar
-
Crack/Crack.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 76KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Crack/Keygen.exe.exe windows:4 windows x86 arch:x86
662f85a4d06d98c726be9dbd562bb098
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord582
ord583
_CIcos
_adj_fptan
__vbaFreeVar
ord588
__vbaLenBstr
__vbaFreeVarList
__vbaEnd
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
ord593
ord300
ord594
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
ord598
ord306
_CIsin
ord632
__vbaChkstk
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaI2I4
__vbaPrintObj
__vbaObjVar
DllFunctionCall
_adj_fpatan
EVENT_SINK_Release
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
ord714
__vbaFPException
ord535
_CIlog
__vbaErrorOverflow
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
_adj_fdivr_m32
__vbaR8Var
_adj_fdiv_r
ord100
__vbaVarAdd
__vbaLateMemCall
__vbaFpI2
ord614
__vbaR8IntI2
_CIatan
_allmul
_CItan
__vbaFPInt
_CIexp
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Crack/下载说明.htm.html .js polyglot
-
Crack/安装说明.txt
-
Crack/非常世纪资源网.url.url
-
mfx.exe.exe windows:4 windows x86 arch:x86
a3cd138f09c17f81fb64526d63cb2df6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
ExitProcess
DeleteFileA
FreeLibrary
lstrcpyA
GetProcAddress
LoadLibraryA
VirtualFree
CloseHandle
WriteFile
GetWindowsDirectoryA
CreateFileA
lstrcatA
CompareStringA
GetCurrentDirectoryA
lstrlenA
ReadFile
SetFilePointer
VirtualAlloc
GetModuleFileNameA
InterlockedIncrement
GetModuleHandleA
user32
SetCursor
LoadCursorA
wsprintfA
ShowWindow
FindWindowA
MessageBoxA
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 604B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 766B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 434B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
下载说明.htm.html .js polyglot
-
非常世纪资源网.url.url