Static task
static1
Behavioral task
behavioral1
Sample
412a27152a2bdf7e3ee3a71e967ed76557d4e9167988bb403db0592c6382da5f_JC.exe
Resource
win7-20230712-en
General
-
Target
412a27152a2bdf7e3ee3a71e967ed76557d4e9167988bb403db0592c6382da5f_JC.exe
-
Size
360KB
-
MD5
9dff18bc01ad9ffa172a0cf348e3e634
-
SHA1
111218208b95640c3fffe7f70f25ab06f5cd3338
-
SHA256
412a27152a2bdf7e3ee3a71e967ed76557d4e9167988bb403db0592c6382da5f
-
SHA512
702920090bf6b990e8d4e70916a2040471c64df53d3b7f693dd3170244d1a8765956dc0f07e59d6afa228e8da38cfe235869fea0dba0b07f67ec25573fc926c7
-
SSDEEP
6144:quTXFMLfS9Qr8f9SStfZWEqKm0rFhZAQi1ajiV+SyRwp:qIXFMzS9Qr8f9SSFRlm0BSC4+Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 412a27152a2bdf7e3ee3a71e967ed76557d4e9167988bb403db0592c6382da5f_JC.exe
Files
-
412a27152a2bdf7e3ee3a71e967ed76557d4e9167988bb403db0592c6382da5f_JC.exe.exe windows x86
ed5b2a553081ac99075a67ace09b6e18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FillConsoleOutputCharacterA
WriteConsoleInputW
GetConsoleAliasesLengthW
InterlockedDecrement
InterlockedCompareExchange
GetComputerNameW
SetEvent
GetTickCount
GetCurrentThread
CreateActCtxW
LoadLibraryW
ReadConsoleInputA
TransactNamedPipe
GetNamedPipeInfo
HeapValidate
GetModuleFileNameW
GetACP
DisconnectNamedPipe
GetConsoleAliasesW
GetProfileIntA
GetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
DeleteTimerQueue
Module32FirstW
FoldStringW
FindNextFileA
HeapSetInformation
UpdateResourceW
WriteProfileStringW
TlsAlloc
AreFileApisANSI
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoW
RaiseException
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
HeapFree
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
SetFilePointer
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
GetCPInfo
GetOEMCP
IsValidCodePage
WideCharToMultiByte
CloseHandle
CreateFileA
GetModuleHandleA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
SetEndOfFile
GetProcessHeap
ReadFile
user32
LoadMenuA
CharLowerBuffW
CreateAcceleratorTableA
CharToOemBuffW
CharUpperBuffW
Sections
.text Size: 255KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ