Static task
static1
Behavioral task
behavioral1
Sample
5384d18e4d08f1exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5384d18e4d08f1exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
5384d18e4d08f1exeexe_JC.exe
-
Size
851KB
-
MD5
5384d18e4d08f1ea8a1d6e323c852cff
-
SHA1
1a92ec5279d769348927e9d4adf80ea627fe3117
-
SHA256
dafdf184709752662738808bfba5b53bfc28436e144688179c0bc52a40c0a3a2
-
SHA512
28cdb0e57018050f8d102d4a5babaf4dcaf019fc467aa3dae2fb486a03d7061217a432fa528afc1d52a80c9aa80348f43896a3b292a6c2cf16b15819eeeada20
-
SSDEEP
12288:SaVt0m8mQvhGLYAcAf7PKsNz9MKuajV5qISm2bmz4O/EAhOFNTlhncGn6jsC7V7E:Sa4Ac7hQ/Efnl/n6AaIZB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5384d18e4d08f1exeexe_JC.exe
Files
-
5384d18e4d08f1exeexe_JC.exe.exe windows x86
445df5d7d92f947f48db7f9f03ef3e68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
kernel32
LoadResource
FindResourceW
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadLibraryExW
lstrcmpiW
GetProcAddress
lstrlenA
RaiseException
FlushInstructionCache
GetCurrentProcess
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
lstrcmpW
MulDiv
GlobalFree
GlobalHandle
ExitProcess
CloseHandle
CreateThread
CreateEventW
WaitForSingleObject
SetEvent
GetCommandLineW
LocalFree
lstrcpyW
FreeResource
TerminateProcess
GetProcessId
InitializeCriticalSection
CreateSemaphoreW
ReleaseSemaphore
ReadFile
WriteFile
MoveFileW
WritePrivateProfileStringW
GetPrivateProfileStringW
LoadLibraryW
FindClose
FindFirstFileW
SetEnvironmentVariableA
CompareStringW
SetEndOfFile
CreateFileW
WriteConsoleW
LockResource
VirtualQuery
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetFilePointer
GetFileType
SetHandleCount
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetACP
HeapReAlloc
GetTimeZoneInformation
GetLocaleInfoW
HeapSize
GetConsoleMode
GetConsoleCP
GetStdHandle
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LCMapStringW
GetCPInfo
GetStartupInfoW
HeapSetInformation
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
RtlUnwind
DecodePointer
EncodePointer
GetStringTypeW
InterlockedExchange
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedPushEntrySList
GlobalAlloc
GlobalLock
GlobalUnlock
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
SetLastError
GetTempPathW
DeleteFileW
GetSystemDirectoryW
Sleep
GetTickCount
GetVersionExW
GetCurrentThreadId
WideCharToMultiByte
lstrlenW
GetLastError
InterlockedCompareExchange
SetStdHandle
GetProcessAffinityMask
user32
LoadIconW
PtInRect
GetWindowThreadProcessId
IsWindow
GetForegroundWindow
InvalidateRect
wsprintfW
DestroyWindow
MoveWindow
EndDialog
GetWindow
MapDialogRect
CharNextW
SetWindowLongW
GetWindowTextLengthW
UnregisterClassA
LoadCursorW
CreateWindowExW
SendMessageW
SetWindowTextW
SetWindowPos
GetClientRect
ScreenToClient
ShowWindow
KillTimer
SetActiveWindow
SendDlgItemMessageW
GetDlgItem
MessageBoxW
SetWindowContextHelpId
GetWindowLongW
ReleaseDC
RegisterClassExW
GetMessageW
TranslateMessage
DispatchMessageW
PostMessageW
PostThreadMessageW
DialogBoxIndirectParamW
CallWindowProcW
InvalidateRgn
SetCapture
ReleaseCapture
ClientToScreen
CreateAcceleratorTableW
GetDC
GetClassInfoExW
GetDesktopWindow
GetParent
GetClassNameW
RedrawWindow
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetFocus
GetSysColor
DestroyAcceleratorTable
DefWindowProcW
RegisterWindowMessageW
GetWindowTextW
gdi32
GetStockObject
GetObjectW
CreateFontW
CreateSolidBrush
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetDeviceCaps
advapi32
RegSetValueExW
RegEnumKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
shell32
CommandLineToArgvW
Shell_NotifyIconW
ole32
OleUninitialize
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
OleInitialize
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
StringFromGUID2
OleLockRunning
CoInitialize
CoUninitialize
CoRegisterClassObject
CoReleaseServerProcess
CoAddRefServerProcess
CoRevokeClassObject
oleaut32
UnRegisterTypeLi
RegisterTypeLi
OleCreateFontIndirect
SysAllocStringLen
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
DispCallFunc
VariantCopy
VariantClear
VariantInit
SysFreeString
SysStringLen
SysAllocString
SafeArrayCreateVector
secur32
GetUserNameExW
winhttp
WinHttpReceiveResponse
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpGetProxyForUrl
WinHttpCrackUrl
WinHttpConnect
WinHttpOpenRequest
WinHttpSetStatusCallback
WinHttpSendRequest
WinHttpOpen
WinHttpSetOption
WinHttpCloseHandle
Sections
.text Size: 583KB - Virtual size: 583KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ