__RemovePropW@12
Static task
static1
Behavioral task
behavioral1
Sample
Magic_Dvd_Ripper_5_4_serial_keys_gen.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Magic_Dvd_Ripper_5_4_serial_keys_gen.exe
Resource
win10v2004-20241007-en
General
-
Target
2c2b4e9776756b946affefa1f72d2af7_JaffaCakes118
-
Size
134KB
-
MD5
2c2b4e9776756b946affefa1f72d2af7
-
SHA1
fc0fbee058efef2d7e47e0b03fd55ede91f7652d
-
SHA256
d58c1471a3149fdefe66defc1e916666c8d4c421bda6e0a4c578179324264947
-
SHA512
12ba99573fff84e6c7d7959fea43a9de7970d30ebe91ad094338312fae4a30f67aa736713095dd4473a7615b84646b90a33e6269d0e4a89fc05ae79a14c70411
-
SSDEEP
3072:G1R4cZ2Dj48ZCEOVJfD6dFgJUmtoeY+YzfRlD5WaVHDwPdzQb:Gb4cZACRfQEVtoe8zfRll9xb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Magic_Dvd_Ripper_5_4_serial_keys_gen.exe
Files
-
2c2b4e9776756b946affefa1f72d2af7_JaffaCakes118.zip
-
FILE_ID.DIZ
-
Magic_Dvd_Ripper_5_4_serial_keys_gen.exe.exe windows:5 windows x86 arch:x86
8ae74cf5b0e52f8704cac79b7955e656
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrCpyNW
PathUnquoteSpacesA
StrFromTimeIntervalA
PathCombineA
StrFormatKBSizeA
shell32
ord716
kernel32
LockFile
GetCommConfig
TlsSetValue
SetFileShortNameW
GetProfileStringW
GetStartupInfoA
ChangeTimerQueueTimer
QueryPerformanceCounter
FileTimeToDosDateTime
SetProcessWorkingSetSize
CreateDirectoryExW
SignalObjectAndWait
LoadLibraryExW
SetNamedPipeHandleState
CreateSemaphoreA
GetLogicalDriveStringsW
lstrcpynA
CreateMutexW
GetDevicePowerState
user32
ReplyMessage
HideCaret
CopyAcceleratorTableW
EnumThreadWindows
GetDlgItemTextW
ScrollWindowEx
WindowFromDC
LoadBitmapW
MapVirtualKeyExW
LoadAcceleratorsW
GetDC
WinHelpA
IsCharLowerA
GetMenuStringW
GetClipCursor
CopyImage
DialogBoxIndirectParamW
DrawTextA
DlgDirSelectExW
InvalidateRgn
DrawTextExW
TranslateMessage
SetCursorPos
GetRawInputBuffer
PeekMessageW
TranslateAcceleratorA
GetListBoxInfo
GetTabbedTextExtentA
SetMenu
AdjustWindowRectEx
MessageBoxW
MapWindowPoints
LoadKeyboardLayoutA
SetWindowTextW
CopyRect
GetMessageTime
DispatchMessageW
GetWindowThreadProcessId
SetPropA
gdi32
ScaleWindowExtEx
GetTextExtentPointW
GetOutlineTextMetricsW
CreateBrushIndirect
BeginPath
GetCurrentObject
GetCharWidthW
Arc
GetCharABCWidthsI
RemoveFontResourceA
GetLayout
GetEnhMetaFileA
SetPixel
PolyTextOutA
advapi32
GetAce
AddAuditAccessObjectAce
AreAllAccessesGranted
BackupEventLogW
Exports
Exports
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.exdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.page Size: 512B - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bmem Size: 512B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sedat Size: 1024B - Virtual size: 612B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 958B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
TSRh.nfo