Static task
static1
Behavioral task
behavioral1
Sample
ae55a1b292a959babb2e1c6e1b1c72cb4723d9cc9a1d5569d86b337d7722b656_JC.exe
Resource
win7-20230712-en
General
-
Target
ae55a1b292a959babb2e1c6e1b1c72cb4723d9cc9a1d5569d86b337d7722b656_JC.exe
-
Size
249KB
-
MD5
5e70d5ff581e40445e432f6ade284716
-
SHA1
6f9d6c99b60394d0d75b90b17e15457885554e9e
-
SHA256
ae55a1b292a959babb2e1c6e1b1c72cb4723d9cc9a1d5569d86b337d7722b656
-
SHA512
2270b214f849405882808ded2e9d8328c08febae6e814258f2db5e3944ad1cfd43cd0d0b86c4a95d60967e8bb0975d87be9b971d85d4aa7d35c849eebf40799b
-
SSDEEP
3072:BmYS5I48mruS3P3iSFJoNcQ7pQJBJssjScAYfTSrhqOPmPd7O:TJ4TugySFqc9HJsmRAkiq1Pd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae55a1b292a959babb2e1c6e1b1c72cb4723d9cc9a1d5569d86b337d7722b656_JC.exe
Files
-
ae55a1b292a959babb2e1c6e1b1c72cb4723d9cc9a1d5569d86b337d7722b656_JC.exe.exe windows x86
9d608900baedff6c1407537712c386a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetInformationJobObject
GetDriveTypeW
_llseek
EndUpdateResourceW
InterlockedIncrement
MoveFileExW
GetConsoleAliasA
InterlockedDecrement
QueryPerformanceCounter
CreateJobObjectW
GetProfileStringW
SetConsoleScreenBufferSize
GetTimeFormatA
OpenSemaphoreA
GetTickCount
GetNumberFormatA
GetConsoleAliasExesW
WaitNamedPipeW
GetDateFormatA
GetUserDefaultLangID
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
SetFileShortNameW
LoadLibraryW
ReadConsoleInputA
_hread
GetCalendarInfoA
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
DeleteVolumeMountPointW
GetFileAttributesA
SetConsoleMode
GetWriteWatch
SetProcessAffinityMask
GetStartupInfoW
GetStartupInfoA
GetHandleInformation
GetCurrentDirectoryW
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
PeekConsoleInputW
MoveFileW
OpenWaitableTimerA
LoadLibraryA
OpenMutexA
InterlockedExchangeAdd
SetCalendarInfoW
GetFileType
BuildCommDCBAndTimeoutsW
AddVectoredExceptionHandler
SetConsoleCtrlHandler
AddAtomW
GlobalGetAtomNameW
FindNextFileA
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
CreateMailslotA
GetCurrentDirectoryA
EnumDateFormatsW
GetUserDefaultUILanguage
FindFirstVolumeA
GetWindowsDirectoryW
MoveFileWithProgressW
DebugBreak
EnumSystemLocalesW
DeleteFileA
GetCommandLineW
GetVolumeNameForVolumeMountPointA
lstrcatA
ExitProcess
GetLastError
MoveFileA
WideCharToMultiByte
HeapAlloc
HeapSetInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetModuleHandleW
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetStringTypeW
Sleep
IsProcessorFeaturePresent
RtlUnwind
HeapReAlloc
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
RaiseException
gdi32
GetCharWidthA
GetTextFaceW
GetBoundsRect
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jure Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ