Static task
static1
Behavioral task
behavioral1
Sample
NA_NA_1914b043b09561exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_NA_1914b043b09561exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
NA_NA_1914b043b09561exeexe_JC.exe
-
Size
532KB
-
MD5
1914b043b09561ca303f5d3c4f7a2d81
-
SHA1
6f121e1bf78ba1e35ad75e9adade2014869b0c1b
-
SHA256
f7dc02c7cf72553aa263947e8564f15bc281caebfb8298f6fc0c372e9cedc387
-
SHA512
2b80a8bd50d8107ada4e6133d651173058c224d3db10ec9bad81c032d8862a2ae8427e7474dc4d50a95106a50d3f3c20d1fc4320ff80ca677c8c7159ea06a23c
-
SSDEEP
6144:rxgdeVTfqEgrKOQoa0TYz7rYj7JPPpdK07j8ZQjgvx:rxgUVTCEiK6RY8j7mZQUx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NA_NA_1914b043b09561exeexe_JC.exe
Files
-
NA_NA_1914b043b09561exeexe_JC.exe.exe windows x86
9c673a96f0e44dec4489cf552aa279dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
kernel32
GetModuleFileNameA
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
GetDriveTypeA
SetUnhandledExceptionFilter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetCurrentProcessId
QueryPerformanceCounter
HeapSize
TerminateProcess
HeapReAlloc
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
GetTickCount
GetCurrentDirectoryA
GetFileTime
GetFileAttributesA
SetErrorMode
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringA
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
CreateFileA
GetFullPathNameA
FindFirstFileA
FindClose
lstrcpyA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalAlloc
LocalFree
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
MulDiv
GetModuleHandleA
GetProcAddress
SetLastError
InterlockedDecrement
GlobalLock
GlobalUnlock
GlobalFree
GetVolumeInformationA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
DeleteFileA
CloseHandle
SetFileAttributesA
GetSystemTime
WaitForSingleObject
ResumeThread
WriteProcessMemory
ReadProcessMemory
OpenProcess
FormatMessageA
GetLastError
CreateProcessA
GetCommandLineA
SetEnvironmentVariableA
FreeResource
MultiByteToWideChar
GetVersion
lstrcmpiA
lstrlenA
CompareStringA
CompareStringW
user32
GrayStringA
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
GetSysColor
GetWindow
PtInRect
CopyRect
GetTopWindow
GetMessageTime
GetMessagePos
ClientToScreen
PeekMessageA
DispatchMessageA
GetLastActivePopup
GetForegroundWindow
MapWindowPoints
GetWindowTextLengthA
IsChild
SetFocus
GetFocus
SendDlgItemMessageA
RemovePropA
GetPropA
SetPropA
GetClassNameA
GetClassInfoExA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
GetCapture
WinHelpA
RegisterWindowMessageA
IsDialogMessageA
SetWindowTextA
MoveWindow
ShowWindow
GetMenuCheckMarkDimensions
CheckMenuItem
EnableMenuItem
MessageBoxA
GetKeyState
DrawTextExA
DrawTextA
TabbedTextOutA
UnhookWindowsHookEx
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
CharUpperA
LoadBitmapA
DrawIcon
GetClientRect
EnableWindow
LoadIconA
FillRect
GetSysColorBrush
SetTimer
SendMessageA
IsIconic
GetSystemMetrics
GetWindowRect
KillTimer
GetWindowTextA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
GetWindowPlacement
SystemParametersInfoA
IntersectRect
OffsetRect
SetWindowPos
SetWindowLongA
CallWindowProcA
DefWindowProcA
GetDlgCtrlID
UnregisterClassA
RegisterClassA
GetClassInfoA
EqualRect
AdjustWindowRectEx
GetMenuItemCount
GetMenuItemID
GetSubMenu
PostMessageA
GetMenu
UpdateWindow
IsWindowVisible
SetForegroundWindow
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
SetCapture
DestroyMenu
LoadCursorA
SetWindowContextHelpId
MapDialogRect
SetCursor
PostQuitMessage
wsprintfA
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
gdi32
GetRgnBox
GetTextColor
GetBkColor
GetMapMode
CreateRectRgnIndirect
GetDeviceCaps
GetStockObject
CreateBitmap
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
BitBlt
CreateCompatibleDC
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
shell32
SHFileOperationA
comctl32
ord17
shlwapi
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathFindFileNameA
oledlg
ord8
ole32
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StgOpenStorageOnILockBytes
CoTaskMemFree
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
OleCreateFontIndirect
SysAllocString
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringByteLen
SysStringLen
SysFreeString
imagehlp
MapAndLoad
UnMapAndLoad
Sections
.text Size: 164KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ