Static task
static1
Behavioral task
behavioral1
Sample
JediOutcast.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
JediOutcast.exe
Resource
win10v2004-20221111-en
General
-
Target
JediOutcast.exe
-
Size
172KB
-
MD5
a843503b68269761074390d645fb2f3c
-
SHA1
4d12d3ee4794db87ca8903e925bf793973555089
-
SHA256
e78ef4a783263e7e852bb1d0de5726077bb067f687ae2d63c69a2a87a9cc7954
-
SHA512
7b183f43a28e0afca80b46ac5d707e8a179e66c7e0cec2975915b38c029061efb0ec0fc0b32a5647476158c97f8893e80d79909c8f3d163a4def1b523c0d0dcc
-
SSDEEP
1536:0k5v0xRxi9btxtFPeBC0NxBbCT1yCKQurFNEFbosUE8keA/RAy90Xn1gRZpLcweq:f5vqbsmN7BrFqFbzUp4BRwlFSQom7u
Malware Config
Signatures
Files
-
JediOutcast.exe.exe windows x86
aff3354c38391f382335c4df96d98156
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
ExitProcess
OutputDebugStringA
lstrcmpiA
LoadLibraryA
GetProcAddress
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetVolumeInformationA
RtlUnwind
HeapFree
CloseHandle
GetCurrentDirectoryA
HeapReAlloc
WaitForSingleObject
lstrlenA
GetCurrentProcess
TerminateProcess
lstrcpynA
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
ReadFile
WriteFile
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetStdHandle
FreeLibrary
GetCPInfo
GetACP
GetOEMCP
SetEndOfFile
LCMapStringA
LCMapStringW
SetCurrentDirectoryA
lstrcatA
GetCommandLineA
GlobalMemoryStatus
GetVersion
GetModuleHandleA
GetVersionExA
GetStartupInfoA
RaiseException
HeapAlloc
FlushFileBuffers
user32
UpdateWindow
MoveWindow
ReleaseDC
DrawTextA
GetDC
GetDesktopWindow
GetWindowRect
LoadImageA
DestroyIcon
SetCursor
LoadIconA
LoadCursorA
DestroyWindow
CloseWindow
GetKeyState
CreateWindowExA
SetWindowRgn
BeginPaint
GetClientRect
DrawIconEx
IntersectRect
WinHelpA
ExitWindowsEx
DefWindowProcA
GetWindowLongA
GetClassInfoA
RegisterClassA
GetMessageA
TranslateMessage
DispatchMessageA
CharUpperA
wvsprintfA
FindWindowA
SendMessageA
EndPaint
PostQuitMessage
SetWindowLongA
SetFocus
SetWindowTextA
SetDlgItemTextA
CheckDlgButton
IsDlgButtonChecked
InvalidateRect
EndDialog
SetCapture
ReleaseCapture
SetTimer
DialogBoxParamA
ShowWindow
GetFocus
MessageBoxA
msvfw32
DrawDibClose
DrawDibOpen
DrawDibDraw
comctl32
ord17
winmm
PlaySoundA
gdi32
SelectObject
SetWindowOrgEx
DeleteObject
GetObjectA
GetDeviceCaps
CreatePalette
CreateFontIndirectA
SetBkColor
CreateCompatibleDC
BitBlt
ExtCreateRegion
SetTextColor
DeleteDC
GetDIBColorTable
SetBkMode
CreateDIBSection
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
Sections
.text Size: 128KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ