Static task
static1
Behavioral task
behavioral1
Sample
7aa6a3dccf29348a58a106ca27606d16e293cd0ec2fae10ec54c9041058d5907_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
7aa6a3dccf29348a58a106ca27606d16e293cd0ec2fae10ec54c9041058d5907_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
7aa6a3dccf29348a58a106ca27606d16e293cd0ec2fae10ec54c9041058d5907_JC.exe
-
Size
249KB
-
MD5
5adda548b167701522e79f1c56692d79
-
SHA1
6f50fbe7f9a8d8999686a5d6448ba8552658ff93
-
SHA256
7aa6a3dccf29348a58a106ca27606d16e293cd0ec2fae10ec54c9041058d5907
-
SHA512
2838c44dd6a03b43f72b62de5a07e28a6bfd70b418969ddb7d15ea1561dd19860f2bcdc61e67aa6c0e3948707c1b5502d493d8937f82b37879bc3904c66f8396
-
SSDEEP
3072:zmfSUxgcm/uqbL5fBm6dzdKQ7puKS/7co+OH1Ux0qyo1bCHOozoVtTTi:2BgHug5fBmQQL9gPyWcnoVl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7aa6a3dccf29348a58a106ca27606d16e293cd0ec2fae10ec54c9041058d5907_JC.exe
Files
-
7aa6a3dccf29348a58a106ca27606d16e293cd0ec2fae10ec54c9041058d5907_JC.exe.exe windows x86
9d608900baedff6c1407537712c386a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetInformationJobObject
GetDriveTypeW
_llseek
EndUpdateResourceW
InterlockedIncrement
MoveFileExW
GetConsoleAliasA
InterlockedDecrement
QueryPerformanceCounter
CreateJobObjectW
GetProfileStringW
SetConsoleScreenBufferSize
GetTimeFormatA
OpenSemaphoreA
GetTickCount
GetNumberFormatA
GetConsoleAliasExesW
WaitNamedPipeW
GetDateFormatA
GetUserDefaultLangID
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
SetFileShortNameW
LoadLibraryW
ReadConsoleInputA
_hread
GetCalendarInfoA
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
DeleteVolumeMountPointW
GetFileAttributesA
SetConsoleMode
GetWriteWatch
SetProcessAffinityMask
GetStartupInfoW
GetStartupInfoA
GetHandleInformation
GetCurrentDirectoryW
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
PeekConsoleInputW
MoveFileW
OpenWaitableTimerA
LoadLibraryA
OpenMutexA
InterlockedExchangeAdd
SetCalendarInfoW
GetFileType
BuildCommDCBAndTimeoutsW
AddVectoredExceptionHandler
SetConsoleCtrlHandler
AddAtomW
GlobalGetAtomNameW
FindNextFileA
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
CreateMailslotA
GetCurrentDirectoryA
EnumDateFormatsW
GetUserDefaultUILanguage
FindFirstVolumeA
GetWindowsDirectoryW
MoveFileWithProgressW
DebugBreak
EnumSystemLocalesW
DeleteFileA
GetCommandLineW
GetVolumeNameForVolumeMountPointA
lstrcatA
ExitProcess
GetLastError
MoveFileA
WideCharToMultiByte
HeapAlloc
HeapSetInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetModuleHandleW
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetStringTypeW
Sleep
IsProcessorFeaturePresent
RtlUnwind
HeapReAlloc
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
RaiseException
gdi32
GetCharWidthA
GetTextFaceW
GetBoundsRect
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cimepex Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ