Static task
static1
Behavioral task
behavioral1
Sample
c864578232d0dd_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c864578232d0dd_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
c864578232d0dd_JC.exe
-
Size
859KB
-
MD5
c864578232d0dd4b64df4bdd3927c6f9
-
SHA1
666da13e690b8ade2f921dc8150dc95f96af4bc4
-
SHA256
fd40a10c2f32e63d4536db963d5a2baf1b09f5462deeacd436fade92b6754412
-
SHA512
e4a5042eb3f3ebc2c66c8785b475047ca6487f3736443a12cc820d1a936baa0292337cc96feaf602f386ddfa4534eee9651a4800900d7d3003349be0fb89f5a8
-
SSDEEP
12288:9H9VjGj+2YGVFgICRWZkM4vzxidC2AM5bYlczdNAz5Xo5Xoz+rqz7NBq9PK:7ICkZ1OzxhtM5btzHkwWGqn3mPK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c864578232d0dd_JC.exe
Files
-
c864578232d0dd_JC.exe.exe windows x86
30274859f673b02943391bd605bcb3b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
lang
GetValueForID
SetWindowLang
gdiplus
GdipCreateRegion
GdipDeleteRegion
GdipCreatePath
GdipDeletePath
GdipAddPathEllipse
GdipCreateRegionRect
GdipCreateRegionPath
GdipCombineRegionRegion
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipFree
GdipAlloc
GdipCreatePen1
GdipDeletePen
GdiplusShutdown
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawEllipse
GdipDrawPie
GdipFillPie
GdipDrawLine
GdipDrawArc
GdipFillRegion
GdipSetClipRegion
GdipResetClip
GdipGetRegionBounds
GdipSetEmpty
GdipFillRectangle
GdipFillEllipse
GdiplusStartup
GdipCreateFromHDC
kernel32
GetThreadLocale
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetFullPathNameA
GetCPInfo
GetOEMCP
GetModuleHandleW
FileTimeToSystemTime
GetFileAttributesA
FileTimeToLocalFileTime
GetFileSizeEx
RtlUnwind
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
ExitProcess
ExitThread
CreateThread
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GlobalFree
WritePrivateProfileStringA
GetCurrentProcessId
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetModuleFileNameA
GetLocaleInfoA
CompareStringA
InterlockedExchange
lstrcmpA
FreeLibrary
SetErrorMode
FormatMessageA
LocalFree
GetDiskFreeSpaceExA
GetDiskFreeSpaceA
GetVolumeInformationA
GetDriveTypeA
FindFirstFileA
FindNextFileA
FindClose
GetVolumePathNameA
CreateFileA
DeviceIoControl
FindFirstFileExA
CloseHandle
GetCurrentDirectoryA
GetPrivateProfileStringA
GetPrivateProfileIntA
FindFirstVolumeA
GetVolumeNameForVolumeMountPointA
GetTickCount
MultiByteToWideChar
MulDiv
FreeResource
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
Sleep
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
GetModuleHandleA
LoadLibraryA
GetProcAddress
GetLastError
SetLastError
GetFileTime
user32
EndPaint
TranslateAcceleratorA
BringWindowToTop
SetRectEmpty
CreatePopupMenu
InsertMenuItemA
InvalidateRect
LoadAcceleratorsA
DestroyMenu
ReuseDDElParam
UnpackDDElParam
IsZoomed
IsRectEmpty
SetWindowRgn
SetTimer
KillTimer
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
InflateRect
GetMenuItemInfoA
GetSysColorBrush
CharUpperA
CharNextA
CopyAcceleratorTableA
SetRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
PostThreadMessageA
UnregisterClassA
WindowFromPoint
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
BeginPaint
CallWindowProcA
GetMenu
IntersectRect
GetWindowPlacement
RegisterClipboardFormatA
SetWindowContextHelpId
MapDialogRect
GetWindowTextLengthA
GetWindowTextA
SetWindowPos
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SendDlgItemMessageA
GetDlgItem
CheckDlgButton
GetWindow
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
ShowOwnedPopups
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetMenuState
EnableMenuItem
CheckMenuItem
CopyRect
IsWindow
PostQuitMessage
MessageBoxA
SendNotifyMessageA
GetParent
SetCapture
ReleaseCapture
SetCursor
GetSysColor
OffsetRect
PtInRect
GetDesktopWindow
GetDC
ReleaseDC
ClientToScreen
GetSubMenu
DrawTextA
EnableWindow
GetClientRect
GetWindowRect
IsIconic
DrawMenuBar
LoadMenuA
ModifyMenuA
DrawIcon
GetSystemMetrics
LoadCursorA
LoadIconA
SendMessageA
GetWindowDC
GrayStringA
DrawTextExA
TabbedTextOutA
FillRect
RedrawWindow
UpdateWindow
RegisterWindowMessageA
DefWindowProcA
WinHelpA
PostMessageA
LoadImageA
SystemParametersInfoA
GetWindowLongA
gdi32
SaveDC
RestoreDC
SetBkMode
SetMapMode
ExcludeClipRect
IntersectClipRect
GetViewportExtEx
GetWindowExtEx
GetPixel
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetBkColor
GetClipBox
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
GetTextMetricsA
GetTextExtentPoint32A
CreateEllipticRgn
DPtoLP
LPtoDP
Ellipse
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
SetTextColor
CreateBitmap
CreateRectRgnIndirect
CreateSolidBrush
CreateFontIndirectA
GetDeviceCaps
GetObjectA
GetDIBits
SetDIBits
DeleteObject
BitBlt
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
shell32
DragFinish
DragQueryFileA
comctl32
ord17
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
StgOpenStorageOnILockBytes
OleUninitialize
CreateStreamOnHGlobal
CLSIDFromProgID
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CLSIDFromString
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
CoFreeUnusedLibraries
oleaut32
OleLoadPicturePath
SysAllocStringByteLen
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysFreeString
OleLoadPicture
OleCreateFontIndirect
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
SysAllocString
VariantCopy
Sections
.text Size: 372KB - Virtual size: 372KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 114KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE