Static task
static1
Behavioral task
behavioral1
Sample
9a4b4014e45320_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9a4b4014e45320_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
9a4b4014e45320_JC.exe
-
Size
460KB
-
MD5
9a4b4014e45320c26288d3231dba2cec
-
SHA1
347446d09cb2b80454dd841fbb2c80241364a969
-
SHA256
12e2aee3f8e82644e49d7d659080e90182dc64ec0c8d1209d33b26187c7e5df0
-
SHA512
f24cc3cef076c4831cc701a57e83a7816bc559eaaacf08779814c79483cc56de7ef7916f0c1b8f1729400d82a0e702f17e351851b4a9623c67fc613c90069509
-
SSDEEP
12288:hP4jJkjXDUMwVG24N6i7PLARxgHVSZMkv:ukUl4N37PLKjMk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9a4b4014e45320_JC.exe
Files
-
9a4b4014e45320_JC.exe.exe windows x86
65665111c02b16074efc92273a7e1e5c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
GetProcAddress
LoadLibraryW
CloseHandle
LocalFree
lstrlenA
GetCurrentProcess
GetCurrentThread
GetConsoleWindow
AllocConsole
WaitForSingleObject
CreateMutexA
GetLastError
ExitProcess
GetTickCount
LocalAlloc
Sleep
CreateFileW
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
InterlockedCompareExchange
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
GetLocaleInfoW
GetStringTypeW
RaiseException
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
GetCPInfo
HeapAlloc
GetCommandLineA
HeapSetInformation
LCMapStringW
GetTimeFormatA
GetDateFormatA
CompareStringW
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
GetFileAttributesA
HeapCreate
HeapDestroy
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
HeapReAlloc
FatalAppExitA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
SetConsoleCtrlHandler
GetTimeZoneInformation
FreeLibrary
SetFilePointer
GetConsoleCP
GetConsoleMode
GetExitCodeProcess
CreateProcessA
FlushFileBuffers
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
SetServiceStatus
RegisterServiceCtrlHandlerA
oleaut32
SysAllocString
SysFreeString
SysStringLen
Sections
.text Size: 431KB - Virtual size: 431KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ