Static task
static1
Behavioral task
behavioral1
Sample
3736791deda5d1exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3736791deda5d1exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
3736791deda5d1exeexe_JC.exe
-
Size
848KB
-
MD5
3736791deda5d1b0851bc8101ad06ac0
-
SHA1
6609a0be27c1eb08093bef4a6c8a005f3781a285
-
SHA256
58ca6d67d05c6d06b9b3ebdf0d2ab4fc8bf28f4decc14508da63cbb531236dca
-
SHA512
3c16b673fa767601f47b787c0e61be715fdca303827eafb06fb91d51bfd05533b080e0fe76a7db722c48786ec5475601ce2bbb3de61cdb0393324357782ef986
-
SSDEEP
12288:bvtCaXyxpqpH5bXOfedzpMl+dCC4Jwxae5o2nXI3z5X6z5XAz+rqz7NBq9P1:fFOfedNA+DYwxaeK2XItSuGqn3mP1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3736791deda5d1exeexe_JC.exe
Files
-
3736791deda5d1exeexe_JC.exe.exe windows x86
a97b14b6314496e130b4704f7552b264
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
lang
GetValueForID
SetWindowLang
gdiplus
GdipCreateRegion
GdipDeleteRegion
GdipCreatePath
GdipDeletePath
GdipAddPathEllipse
GdipCreateRegionRect
GdipCreateRegionPath
GdipCombineRegionRegion
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipFree
GdipAlloc
GdipCreatePen1
GdipDeletePen
GdiplusShutdown
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawEllipse
GdipDrawPie
GdipFillPie
GdipDrawLine
GdipDrawArc
GdipFillRegion
GdipSetClipRegion
GdipResetClip
GdipGetRegionBounds
GdipSetEmpty
GdipFillRectangle
GdipFillEllipse
GdiplusStartup
GdipCreateFromHDC
kernel32
GetThreadLocale
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetFullPathNameA
GetCPInfo
GetOEMCP
GetModuleHandleW
FileTimeToSystemTime
GetFileAttributesA
InterlockedIncrement
GetFileTime
FileTimeToLocalFileTime
GetFileSizeEx
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
ExitProcess
ExitThread
CreateThread
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalFree
WritePrivateProfileStringA
GetCurrentProcessId
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
SetErrorMode
FormatMessageA
LocalFree
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
GetVolumeInformationA
GetDriveTypeA
FindNextFileA
FindClose
GetVolumePathNameA
CreateFileA
DeviceIoControl
FindFirstFileExA
CloseHandle
GetCurrentDirectoryA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcatA
FindFirstVolumeA
GetVolumeNameForVolumeMountPointA
FindFirstFileA
GetTickCount
MultiByteToWideChar
MulDiv
FreeResource
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
Sleep
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetLastError
SetLastError
user32
EndPaint
TranslateAcceleratorA
BringWindowToTop
SetRectEmpty
CreatePopupMenu
InsertMenuItemA
InvalidateRect
LoadAcceleratorsA
DestroyMenu
ReuseDDElParam
UnpackDDElParam
IsZoomed
IsRectEmpty
SetWindowRgn
SetTimer
KillTimer
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
InflateRect
GetMenuItemInfoA
GetSysColorBrush
CharUpperA
CharNextA
CopyAcceleratorTableA
SetRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
PostThreadMessageA
UnregisterClassA
WindowFromPoint
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
BeginPaint
CallWindowProcA
GetMenu
IntersectRect
GetWindowPlacement
RegisterClipboardFormatA
SetWindowContextHelpId
MapDialogRect
GetWindowTextLengthA
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
ShowOwnedPopups
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetMenuState
EnableMenuItem
CheckMenuItem
CopyRect
IsWindow
PostQuitMessage
MessageBoxA
SendNotifyMessageA
GetParent
SetCapture
ReleaseCapture
SetCursor
GetSysColor
OffsetRect
PtInRect
GetDesktopWindow
GetDC
ReleaseDC
ClientToScreen
GetSubMenu
DrawTextA
EnableWindow
GetClientRect
GetWindowRect
IsIconic
DrawMenuBar
LoadMenuA
ModifyMenuA
DrawIcon
GetSystemMetrics
LoadCursorA
LoadIconA
SendMessageA
GetWindowDC
GrayStringA
DrawTextExA
TabbedTextOutA
FillRect
RedrawWindow
UpdateWindow
RegisterWindowMessageA
DefWindowProcA
WinHelpA
PostMessageA
LoadImageA
SystemParametersInfoA
GetWindowLongA
gdi32
SaveDC
RestoreDC
SetBkMode
SetMapMode
ExcludeClipRect
IntersectClipRect
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetBkColor
GetClipBox
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
GetTextMetricsA
GetTextExtentPoint32A
CreateEllipticRgn
DPtoLP
LPtoDP
Ellipse
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetTextColor
CreateBitmap
CreateRectRgnIndirect
CreateSolidBrush
CreateFontIndirectA
GetDeviceCaps
GetObjectA
GetDIBits
SetDIBits
DeleteObject
BitBlt
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
shell32
DragFinish
DragQueryFileA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
OleUninitialize
CreateStreamOnHGlobal
CLSIDFromProgID
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CLSIDFromString
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
CoFreeUnusedLibraries
oleaut32
OleLoadPicturePath
SysAllocStringByteLen
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysFreeString
OleLoadPicture
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
Sections
.text Size: 363KB - Virtual size: 363KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 263KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 114KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE