k:\backup\d drive\自作つーる\drmdbgみたいなやつ_コンソールなし\Debug\drmdbgみたいなやつ_コンソールなし.pdb
Overview
overview
5Static
static
5drmcrack/D...It.exe
windows7-x64
5drmcrack/D...It.exe
windows10-2004-x64
5drmcrack/d..._e.exe
windows7-x64
1drmcrack/d..._e.exe
windows10-2004-x64
3drmcrack/d...27.exe
windows7-x64
1drmcrack/d...27.exe
windows10-2004-x64
3drmcrack/d...21.exe
windows7-x64
1drmcrack/d...21.exe
windows10-2004-x64
drmcrack/d...in.exe
windows7-x64
1drmcrack/d...in.exe
windows10-2004-x64
3Behavioral task
behavioral1
Sample
drmcrack/DecryptIt.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
drmcrack/DecryptIt.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
drmcrack/drm2wmv_e.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
drmcrack/drm2wmv_e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
drmcrack/drmdbg527.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
drmcrack/drmdbg527.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
drmcrack/drmdbg621.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
drmcrack/drmdbg621.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
drmcrack/drmdbg_win.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
drmcrack/drmdbg_win.exe
Resource
win10v2004-20240802-en
General
-
Target
121b6827199badf2bfaf3552be3329c0_JaffaCakes118
-
Size
437KB
-
MD5
121b6827199badf2bfaf3552be3329c0
-
SHA1
44ab6f04364133ff550cda27bfca29a9189f0fb2
-
SHA256
86123f1e9d1629e355c85b30e3759e1d3fee8493d6a79c7a0651568ba21ce32a
-
SHA512
4c089fcb3a0ee6be7689320306b6d936f27e26331a6333772ada33100eb6ea196b231dad3183153de7907c4bee9debe1fd62deb07a5f708311cfca6e109b086b
-
SSDEEP
12288:wIqGOPHC3WGJY/L4hYceDNNEQRnJenbBf8t:wIqGK4KMsRt
Malware Config
Signatures
-
resource yara_rule static1/unpack001/drmcrack/DecryptIt.exe upx -
Unsigned PE 5 IoCs
Checks for missing Authenticode signature.
resource unpack001/drmcrack/DecryptIt.exe unpack001/drmcrack/drm2wmv_e.exe unpack001/drmcrack/drmdbg527.exe unpack001/drmcrack/drmdbg621.exe unpack001/drmcrack/drmdbg_win.exe
Files
-
121b6827199badf2bfaf3552be3329c0_JaffaCakes118.zip
-
drmcrack/DecryptIt.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 228KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 174KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
drmcrack/DecryptIt.ini
-
drmcrack/drm2/nodrm.key
-
drmcrack/drm2wmv_e.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.newIID Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
drmcrack/drmdbg527.exe.exe windows:4 windows x86 arch:x86
3a1d23ce48f1d178773e1929043d62fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ContinueDebugEvent
SetFilePointer
ReadFile
CreateFileW
CloseHandle
GetFileSize
CreateFileA
WideCharToMultiByte
FlushInstructionCache
InterlockedDecrement
VirtualFree
VirtualAlloc
VirtualProtectEx
GetSystemInfo
WriteProcessMemory
ReadProcessMemory
GetThreadContext
CreateProcessA
FreeLibrary
GetProcAddress
LoadLibraryA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
DeleteCriticalSection
RaiseException
SetThreadContext
GetThreadLocale
GetLocaleInfoA
SetStdHandle
GetOEMCP
IsBadCodePtr
GetStringTypeW
GetStringTypeA
GetACP
InterlockedExchange
WaitForDebugEvent
GetVersionExA
WaitForSingleObject
GetCurrentThreadId
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
SetEvent
OpenEventA
lstrlenA
lstrcpyA
lstrcpyW
OutputDebugStringA
OutputDebugStringW
lstrcpynW
MultiByteToWideChar
UnmapViewOfFile
IsBadReadPtr
MapViewOfFile
GetLastError
CreateFileMappingA
GetCurrentThread
GetVersion
OpenFileMappingA
InterlockedIncrement
GetModuleFileNameW
GetModuleFileNameA
DebugBreak
GetStdHandle
WriteFile
RtlUnwind
IsBadWritePtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
GetCurrentProcess
SetConsoleCtrlHandler
LCMapStringA
LCMapStringW
HeapFree
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapDestroy
HeapCreate
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualQuery
SetUnhandledExceptionFilter
FlushFileBuffers
VirtualProtect
GetCPInfo
user32
UnregisterClassA
OpenClipboard
EmptyClipboard
SetClipboardData
DispatchMessageA
DispatchMessageW
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
PeekMessageA
MsgWaitForMultipleObjects
CloseClipboard
MessageBoxExA
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
SetThreadToken
RevertToSelf
OpenThreadToken
RegOpenKeyExA
ole32
CoMarshalInterface
CreateStreamOnHGlobal
CoUnmarshalInterface
CoRevokeClassObject
CoRegisterClassObject
CoReleaseMarshalData
Sections
.textbss Size: - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
drmcrack/drmdbg621.exe.exe windows:4 windows x86 arch:x86
3a1d23ce48f1d178773e1929043d62fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
k:\backup\d drive\自作つーる\drmdbgみたいなやつ_コンソールなし\Debug\drmdbgみたいなやつ_コンソールなし.pdb
Imports
kernel32
ContinueDebugEvent
SetFilePointer
ReadFile
CreateFileW
CloseHandle
GetFileSize
CreateFileA
WideCharToMultiByte
FlushInstructionCache
InterlockedDecrement
VirtualFree
VirtualAlloc
VirtualProtectEx
GetSystemInfo
WriteProcessMemory
ReadProcessMemory
GetThreadContext
CreateProcessA
FreeLibrary
GetProcAddress
LoadLibraryA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
DeleteCriticalSection
RaiseException
SetThreadContext
GetThreadLocale
GetLocaleInfoA
SetStdHandle
GetOEMCP
IsBadCodePtr
GetStringTypeW
GetStringTypeA
GetACP
InterlockedExchange
WaitForDebugEvent
GetVersionExA
WaitForSingleObject
GetCurrentThreadId
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
SetEvent
OpenEventA
lstrlenA
lstrcpyA
lstrcpyW
OutputDebugStringA
OutputDebugStringW
lstrcpynW
MultiByteToWideChar
UnmapViewOfFile
IsBadReadPtr
MapViewOfFile
GetLastError
CreateFileMappingA
GetCurrentThread
GetVersion
OpenFileMappingA
InterlockedIncrement
GetModuleFileNameW
GetModuleFileNameA
DebugBreak
GetStdHandle
WriteFile
RtlUnwind
IsBadWritePtr
HeapValidate
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
GetCurrentProcess
SetConsoleCtrlHandler
LCMapStringA
LCMapStringW
HeapFree
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapDestroy
HeapCreate
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualQuery
SetUnhandledExceptionFilter
FlushFileBuffers
VirtualProtect
GetCPInfo
user32
UnregisterClassA
OpenClipboard
EmptyClipboard
SetClipboardData
DispatchMessageA
DispatchMessageW
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
PeekMessageA
MsgWaitForMultipleObjects
CloseClipboard
MessageBoxExA
wsprintfA
advapi32
RegQueryValueExA
RegCloseKey
SetThreadToken
RevertToSelf
OpenThreadToken
RegOpenKeyExA
ole32
CoMarshalInterface
CreateStreamOnHGlobal
CoUnmarshalInterface
CoRevokeClassObject
CoRegisterClassObject
CoReleaseMarshalData
Sections
.textbss Size: - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 152KB - Virtual size: 151KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
drmcrack/drmdbg_win.exe.exe windows:4 windows x86 arch:x86
9fd263932fee48443e0cb55bebcb906d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
k:\backup\d drive\自作つーる\drmdbg_bag_test\Debug\drmdbgみたいなやつ_コンソールなし.pdb
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetLocaleInfoA
GetThreadLocale
SetThreadContext
GetThreadContext
ReadProcessMemory
VirtualAlloc
GetSystemDirectoryA
ContinueDebugEvent
WriteProcessMemory
GetProcAddress
WaitForDebugEvent
FreeLibrary
LoadLibraryA
FlushInstructionCache
VirtualProtectEx
GetSystemInfo
CreateFileA
CreateDirectoryA
CloseHandle
VirtualFree
GetACP
ReadFile
GetFileSize
CreateFileW
WideCharToMultiByte
CreateProcessA
DeleteFileA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
DeleteCriticalSection
RaiseException
GetOEMCP
IsBadCodePtr
GetCPInfo
VirtualProtect
SetStdHandle
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetUnhandledExceptionFilter
InterlockedExchange
GetVersionExA
SetEndOfFile
SetFilePointer
VirtualQuery
GetSystemTimeAsFileTime
WaitForSingleObject
GetCurrentThreadId
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcessId
SetEvent
OpenEventA
lstrlenA
lstrcpyA
lstrcpyW
OutputDebugStringA
OutputDebugStringW
lstrcpynW
MultiByteToWideChar
GetTickCount
IsBadReadPtr
MapViewOfFile
GetLastError
CreateFileMappingA
GetCurrentThread
GetVersion
OpenFileMappingA
InterlockedIncrement
InterlockedDecrement
GetModuleFileNameW
GetModuleFileNameA
IsBadWritePtr
HeapValidate
TerminateProcess
GetCurrentProcess
ExitProcess
GetModuleHandleA
DebugBreak
GetStdHandle
WriteFile
RtlUnwind
GetStartupInfoA
GetCommandLineA
SetConsoleCtrlHandler
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
SetHandleCount
GetFileType
LCMapStringA
LCMapStringW
GetProcessHeap
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
UnmapViewOfFile
user32
UnregisterClassA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
MessageBoxExA
wsprintfA
MessageBoxA
PeekMessageA
DispatchMessageA
DispatchMessageW
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
MsgWaitForMultipleObjects
advapi32
OpenThreadToken
RevertToSelf
SetThreadToken
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
ole32
CoMarshalInterface
CreateStreamOnHGlobal
CoUnmarshalInterface
CoRevokeClassObject
CoRegisterClassObject
CoReleaseMarshalData
Sections
.textbss Size: - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ