Behavioral task
behavioral1
Sample
nero_v6_x_x_crack.exe
Resource
win7-20240903-en
General
-
Target
ee869dff7c38737050d3a94589109aae_JaffaCakes118
-
Size
17KB
-
MD5
ee869dff7c38737050d3a94589109aae
-
SHA1
4b401c828e1fca597df1317ee609645a689c7b5b
-
SHA256
1c509ff0ad14f2c4650c5014a7e767f58d9ccc61aa052ed819579ca033bbdbab
-
SHA512
488008cfbe4f26f25fcf6c27d85761dcf60261d520e70b17f91624743b19b4e2ff284e319b924004f25621d44397828dfa9f8f1cad9de1572168122c288611b3
-
SSDEEP
384:7621qEABnm7puNU9qp+65iXx8VrZp8nbqvqbfhoMLj:+20EAxUpui9qg6E29ZpemvUfO+j
Malware Config
Signatures
-
resource yara_rule static1/unpack001/nero_v6_x_x_crack.exe upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/nero_v6_x_x_crack.exe
Files
-
ee869dff7c38737050d3a94589109aae_JaffaCakes118.zip
-
file_id.diz
-
nero_v6_x_x_crack.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 52KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX3 Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
rp.nfo