Behavioral task
behavioral1
Sample
Secman_Binpda(crack tool)/RootSIGN1.0/RootSiGN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Secman_Binpda(crack tool)/RootSIGN1.0/RootSiGN.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Secman_Binpda(crack tool)/SecMan-Help.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Secman_Binpda(crack tool)/SecMan-Help.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Secman_Binpda(crack tool)/SecMan.exe
Resource
win7-20240729-en
General
-
Target
d254704354b9b1920af48b41d6342474_JaffaCakes118
-
Size
748KB
-
MD5
d254704354b9b1920af48b41d6342474
-
SHA1
e156845bf6638f666baf43a4599eedc5259b5842
-
SHA256
48485c75e2464a6e63a5123699fa7e96fbfe7c32049ba0a2af67a16aadb1dd2c
-
SHA512
70ae2a5ef8acd31538070bde23916e44ba46ebc793c88165495e136d4a2a689e52d2e80ac41b372fb452f0880d30e7d5dbc54d404b2c5b5a6d5ad6305d6c3049
-
SSDEEP
12288:u0mooaA70iJuGnpU5kdWfPBQrY5k0hvsKTuiDAZuGfRPq2VEXYhyzDm/5Cwa5OSg:sooJ702uvWdFM5XGKTuJR5PCINgLMRt
Malware Config
Signatures
-
resource yara_rule static1/unpack001/Secman_Binpda(crack tool)/SecMan.exe upx -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/Secman_Binpda(crack tool)/RootSIGN1.0/RootSiGN.exe unpack001/Secman_Binpda(crack tool)/SecMan.exe unpack002/out.upx
Files
-
d254704354b9b1920af48b41d6342474_JaffaCakes118.zip
-
Secman_Binpda(crack tool)/How-To-Crack.txt
-
Secman_Binpda(crack tool)/RootSIGN1.0/RootSiGN.exe.exe windows:4 windows x86 arch:x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
BiNPDA Size: 383KB - Virtual size: 444KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BiNPDA Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Secman_Binpda(crack tool)/RootSIGN1.0/What-Is-RootSIGN.txt
-
Secman_Binpda(crack tool)/SecMan-Help.url
-
Secman_Binpda(crack tool)/SecMan.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 72KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 142KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Secman_Binpda(crack tool)/SecMan.v1.1(mobile-version).SiS
-
Secman_Binpda(crack tool)/s60_3_0_app_trk_2_8_6.sisx
-
Secman_Binpda(crack tool)/s60_3_1_app_trk_2_8_6.sisx