Static task
static1
Behavioral task
behavioral1
Sample
7b023a71751877_JC.exe
Resource
win7-20230712-en
General
-
Target
7b023a71751877_JC.exe
-
Size
2.8MB
-
MD5
7b023a71751877e104fa0d746ca47514
-
SHA1
63136066d627b31e779aaf0f180c5b709c7b4dff
-
SHA256
f7eeee0adb389d2dac82cac2edd9285f86d7ced3aa1965cc5a130962984bb7d7
-
SHA512
910107d65e38da47dbcaf73702348bf691954f9698175cc40622b7f7f1aceedd71555dca71eaa584bc3bfacc9857977735bd987ac927a4fa4c25c1e207a29589
-
SSDEEP
49152:u/q0FDpNBAmRid1hwsvyDNmOLB6f646k6h668AwuB169zpxRMvhNiU0AJ+4x0Pcd:u/f5pNBFRidBvyDNmKB6f646k6h66auz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7b023a71751877_JC.exe
Files
-
7b023a71751877_JC.exe.exe windows x86
73ba57ee6c122712e52ded91c431b57e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
GlobalFlags
WritePrivateProfileStringW
GetTickCount
GetStartupInfoW
HeapFree
HeapAlloc
RtlUnwind
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
CreateDirectoryW
HeapReAlloc
GetSystemTimeAsFileTime
DeleteFileA
ExitProcess
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileTime
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetProcessHeap
SetEnvironmentVariableA
GetFileSizeEx
GetFileAttributesW
FileTimeToLocalFileTime
FileTimeToSystemTime
SetErrorMode
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
InterlockedDecrement
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
FreeResource
MulDiv
lstrcmpA
GetFullPathNameW
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
SetLastError
GetThreadLocale
CreateEventW
WaitForSingleObject
FormatMessageW
LocalFree
FreeLibrary
GetVolumeInformationW
GetSystemDefaultLangID
FindFirstFileW
FindClose
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateProcessW
WideCharToMultiByte
lstrcpyW
MapViewOfFile
UnmapViewOfFile
GetCurrentProcessId
OpenFileMappingW
CreateFileMappingW
LoadLibraryW
OpenProcess
TerminateProcess
Sleep
lstrcmpiW
GetSystemTime
GetLocalTime
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
Module32FirstW
Module32NextW
GetModuleHandleW
SetFileAttributesW
CreateFileW
CloseHandle
WriteFile
GetSystemDirectoryW
OutputDebugStringA
GetLastError
DeleteFileW
lstrcatW
lstrcpynW
GetWindowsDirectoryW
GetModuleHandleA
GetProcAddress
GetCurrentProcess
FindResourceW
LoadResource
LockResource
SizeofResource
lstrlenA
GetModuleFileNameA
GetModuleFileNameW
OutputDebugStringW
lstrlenW
GetWindowsDirectoryA
GetPrivateProfileIntA
MultiByteToWideChar
GetVersionExW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetFileType
user32
CheckDlgButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextLengthW
GetLastActivePopup
DispatchMessageW
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
IsWindowVisible
CreateWindowExW
GetClassInfoExW
RegisterClassW
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetWindowLongW
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetMenuState
GetMenuItemID
GetMenuItemCount
CharUpperW
RegisterWindowMessageW
GetForegroundWindow
SetRect
MessageBeep
GetAncestor
GetClassNameW
GetWindow
GetWindowTextW
GetSystemMetrics
GetCursorPos
LoadIconW
SetForegroundWindow
FindWindowExW
InvalidateRect
GetClientRect
GetWindowRect
IsIconic
PostMessageW
GetSubMenu
DrawIcon
MessageBoxA
GetClassInfoW
EnableWindow
GetDesktopWindow
UpdateWindow
MessageBoxW
FindWindowW
FindWindowA
SendMessageW
IsDialogMessageW
SetWindowTextW
MoveWindow
ShowWindow
PostThreadMessageW
RegisterClipboardFormatW
PtInRect
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableW
CharNextW
UnregisterClassW
ReleaseCapture
SetCapture
LoadCursorW
GetSysColorBrush
GetWindowThreadProcessId
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
DestroyMenu
SetWindowContextHelpId
MapDialogRect
SetCursor
GetMessageW
TranslateMessage
ValidateRect
CopyRect
PostQuitMessage
gdi32
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
SetMapMode
ExtSelectClipRgn
DeleteDC
GetStockObject
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
RestoreDC
SaveDC
ExtTextOutW
CreateBitmap
GetObjectW
SetBkColor
SetTextColor
GetClipBox
GetDeviceCaps
CreateSolidBrush
DeleteObject
StretchDIBits
GetNearestPaletteIndex
ScaleWindowExtEx
GetPaletteEntries
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegEnumKeyW
RegOpenKeyW
RegDeleteKeyW
RegCreateKeyExW
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
RegCreateKeyW
RegOpenKeyExA
RegDeleteValueW
RegQueryValueExA
RegSetValueExW
RegSetValueExA
RegOpenKeyExW
RegQueryValueExW
RegFlushKey
RegCloseKey
RegQueryValueW
shell32
SHGetSpecialFolderPathW
ShellExecuteExW
ShellExecuteW
shlwapi
StrStrW
PathFindExtensionW
StrCmpIW
PathRemoveExtensionW
PathMakePrettyW
PathFileExistsW
PathFindFileNameA
PathFindFileNameW
PathFileExistsA
PathStripPathW
PathUnquoteSpacesW
PathRemoveBlanksW
AssocQueryStringW
PathStripToRootW
StrStrIW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
OleIsCurrentClipboard
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CLSIDFromProgID
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysStringLen
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ