Static task
static1
Behavioral task
behavioral1
Sample
mjpie.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
mjpie.exe
Resource
win10v2004-20221111-en
General
-
Target
mjpie.exe
-
Size
116KB
-
MD5
f01e51a44b2d54a3eb380d907e4ac4b1
-
SHA1
a87b7289f39644d615bebf13b28c5db7a15fba77
-
SHA256
93eced65aba71be13a93f2b5c22a7363ab58d33c68674285662fd5a4105cc20c
-
SHA512
c2d544e942216f8167e319be4cd4b31cbf2fd61600eacc45ba90f7aadd702d41c6afb5c7cf3ca671cfce9eb0e404b8e8a55b4657f4eebf9aab59ccd103dcdf6e
-
SSDEEP
3072:bnKP3h4ZqxYTkMJAcPieyz02FhYqMlaXPg4c2oDl:DKZ4ZqxTMIj02LJ9oDl
Malware Config
Signatures
Files
-
mjpie.exe.exe windows x86
007dc2957dbc6977d944e5e81fe0866f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmSetCompositionStringA
ImmGetCandidateWindow
ImmDestroyContext
kernel32
lstrlenW
ExitProcess
LocalFree
CompareStringW
FindClose
FindFirstFileW
GetFileAttributesW
lstrcatW
GetFullPathNameW
lstrcpyW
GetEnvironmentVariableW
GetExitCodeProcess
WaitForSingleObject
AssignProcessToJobObject
SetInformationJobObject
CreateJobObjectA
SetConsoleCtrlHandler
GetLastError
CreateProcessW
GetBinaryTypeW
VirtualAlloc
Sleep
GetTickCount
GetStdHandle
WriteConsoleW
GetOEMCP
WideCharToMultiByte
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
SetEndOfFile
HeapSize
HeapReAlloc
GetStringTypeW
LCMapStringW
CreateFileW
CloseHandle
FlushFileBuffers
SetStdHandle
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
FreeLibrary
FatalAppExitA
IsValidCodePage
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
GetProcessHeap
HeapAlloc
WriteFile
HeapFree
GetCommandLineW
HeapSetInformation
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
HeapCreate
HeapDestroy
IsProcessorFeaturePresent
MultiByteToWideChar
ReadFile
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
SetFilePointer
RtlUnwind
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
IsValidLocale
gdi32
AngleArc
SetICMProfileW
PolyPatBlt
pdh
PdhExpandCounterPathW
PdhIsRealTimeQuery
PdhSetCounterScaleFactor
PdhCollectQueryData
winspool.drv
DeletePrinterDataA
SetPortA
shell32
SHAppBarMessage
CommandLineToArgvW
ShellExecuteExW
ws2_32
WSAJoinLeaf
recv
WSAEventSelect
resutils
ResUtilVerifyResourceService
ResUtilSetExpandSzValue
ResUtilGetPropertySize
ClusWorkerCheckTerminate
ResUtilEnumPrivateProperties
comdlg32
GetOpenFileNameW
GetOpenFileNameA
CommDlgExtendedError
Sections
.text Size: 93KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ