Behavioral task
behavioral1
Sample
tKC's-Cracking-Tutorial-#21.exe
Resource
win7-20240729-en
General
-
Target
17d0b0ae7cf30706af2b2bf8ce3ec611_JaffaCakes118
-
Size
439KB
-
MD5
17d0b0ae7cf30706af2b2bf8ce3ec611
-
SHA1
8091ae9eee296058a8a9588918cafcd2a18ebe32
-
SHA256
7bc03c6380b8f5ca9e298aaffc314118a8355b7a714ba9fc22c6262801b13bbd
-
SHA512
fa75789f0f14b4119c6d421f7d7dbd2dffa557d873f25c8e964958af7caca194e406a944b38bf1cefa9258debebc5472606bfb5564c05e6488a23582587101a8
-
SSDEEP
6144:xVTxy8iK3ygM4tZZ34VoPU8mGDqyuGzTrYFeQAV7xlzOq21VNXDOimagsarC2V4H:xd48lfZ3dr93VNlzOb17XRjGfgV
Malware Config
Signatures
-
resource yara_rule static1/unpack001/tKC's-Cracking-Tutorial-#21.exe upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/tKC's-Cracking-Tutorial-#21.exe
Files
-
17d0b0ae7cf30706af2b2bf8ce3ec611_JaffaCakes118.zip
-
tKC's-Cracking-Tutorial-#21.exe.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 756KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
tKC-Cracking-Tutor.hlp