__RemovePropW@12
Static task
static1
Behavioral task
behavioral1
Sample
pducrack.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
pducrack.exe
Resource
win10v2004-20240802-en
General
-
Target
00f44a873159e0309e8b13029d54ee72_JaffaCakes118
-
Size
132KB
-
MD5
00f44a873159e0309e8b13029d54ee72
-
SHA1
52b5009c2148c3a2aec2e9499e89c45a1c5cfbcc
-
SHA256
79991c62da19a28356c92ab84492a9d0fe4ad80717772f7af32bba841a8f8f96
-
SHA512
bb109684bd034b9435fc2ce274fde23be4a7760d30b1ecfcbbd5865793b79090818556e3ee8bb5c88dca03fbeee819c19431da87f3fc8e09792fd6d2ecd066fa
-
SSDEEP
3072:OCuprXnrOaAnY3ThMJGPjx5PXK5BLYjJUm+nOk+A7/UMbo3ZvCdFFdK:kDAnYL3XK5dYdV+nt+AQMQaDu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/pducrack.exe
Files
-
00f44a873159e0309e8b13029d54ee72_JaffaCakes118.zip
-
diskjuggler_crack.txt
-
pducrack.exe.exe windows:5 windows x86 arch:x86
8ae74cf5b0e52f8704cac79b7955e656
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrCpyNW
PathUnquoteSpacesA
StrFromTimeIntervalA
PathCombineA
StrFormatKBSizeA
shell32
ord716
kernel32
LockFile
GetCommConfig
TlsSetValue
SetFileShortNameW
GetProfileStringW
GetStartupInfoA
ChangeTimerQueueTimer
QueryPerformanceCounter
FileTimeToDosDateTime
SetProcessWorkingSetSize
CreateDirectoryExW
SignalObjectAndWait
LoadLibraryExW
SetNamedPipeHandleState
CreateSemaphoreA
GetLogicalDriveStringsW
lstrcpynA
CreateMutexW
GetDevicePowerState
user32
ReplyMessage
HideCaret
CopyAcceleratorTableW
EnumThreadWindows
GetDlgItemTextW
ScrollWindowEx
WindowFromDC
LoadBitmapW
MapVirtualKeyExW
LoadAcceleratorsW
GetDC
WinHelpA
IsCharLowerA
GetMenuStringW
GetClipCursor
CopyImage
DialogBoxIndirectParamW
DrawTextA
DlgDirSelectExW
InvalidateRgn
DrawTextExW
TranslateMessage
SetCursorPos
GetRawInputBuffer
PeekMessageW
TranslateAcceleratorA
GetListBoxInfo
GetTabbedTextExtentA
SetMenu
AdjustWindowRectEx
MessageBoxW
MapWindowPoints
LoadKeyboardLayoutA
SetWindowTextW
CopyRect
GetMessageTime
DispatchMessageW
GetWindowThreadProcessId
SetPropA
gdi32
ScaleWindowExtEx
GetTextExtentPointW
GetOutlineTextMetricsW
CreateBrushIndirect
BeginPath
GetCurrentObject
GetCharWidthW
Arc
GetCharABCWidthsI
RemoveFontResourceA
GetLayout
GetEnhMetaFileA
SetPixel
PolyTextOutA
advapi32
GetAce
AddAuditAccessObjectAce
AreAllAccessesGranted
BackupEventLogW
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.exdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.page Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bmem Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedat Size: 1024B - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 958B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ