Static task
static1
Behavioral task
behavioral1
Sample
91d1851a7dfd2133102df6f58b34823726796744e62f61e4181b977026b19d6b_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
91d1851a7dfd2133102df6f58b34823726796744e62f61e4181b977026b19d6b_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
91d1851a7dfd2133102df6f58b34823726796744e62f61e4181b977026b19d6b_JC.exe
-
Size
326KB
-
MD5
8330ee5e6df29bdb94e65f2c93e3da24
-
SHA1
8b5d4da807717806579cc9dc117f8a91f75154ec
-
SHA256
91d1851a7dfd2133102df6f58b34823726796744e62f61e4181b977026b19d6b
-
SHA512
1cdad334545c2eec3ab6b1a9ac1e12c4b358bf863eae96ababe6bdc6c6706ce0a20e16b6bb20d94247477c0c6ba93a94572adf5305dd5b7fca09dbcfa6830ed6
-
SSDEEP
1536:QRhmabwrFnOATLZ+ZlDD4444444444444444444444444444444444444444444x:CupU1Wg8sZ/FXdVi3F6T6qo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 91d1851a7dfd2133102df6f58b34823726796744e62f61e4181b977026b19d6b_JC.exe
Files
-
91d1851a7dfd2133102df6f58b34823726796744e62f61e4181b977026b19d6b_JC.exe.exe windows x86
5b16cc14a39a823edb97dacf08b8d418
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
CryptAcquireContextA
kernel32
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FreeConsole
GetLastError
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
InitializeCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
TlsGetValue
VirtualAlloc
VirtualProtect
VirtualQuery
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
abort
atexit
atoi
calloc
free
fwrite
memcpy
signal
vfprintf
shell32
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
SHGetSpecialFolderLocation
user32
CheckMenuItem
CheckMenuRadioItem
ChildWindowFromPoint
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
DispatchMessageA
GetClientRect
GetDlgItem
GetKeyState
GetMenuItemID
GetMessageA
GetParent
GetSubMenu
GetSysColorBrush
GetWindowLongA
LoadAcceleratorsA
LoadCursorA
LoadIconA
LoadMenuA
MoveWindow
PostQuitMessage
RegisterClassA
ReleaseCapture
ScreenToClient
SendMessageA
SetCapture
SetClassLongA
SetCursor
SetFocus
SetWindowLongA
ShowWindow
TrackPopupMenu
TranslateAcceleratorA
TranslateMessage
UpdateWindow
comctl32
InitCommonControls
gdi32
DeleteObject
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 152B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 301KB - Virtual size: 301KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE