lhxXfY9mIrDZ
Static task
static1
Behavioral task
behavioral1
Sample
b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe
-
Size
192KB
-
MD5
81cbb0338bea846c1163fc19b5a9c174
-
SHA1
9a9ea1ff3704166d4b76838b17159987e30207e8
-
SHA256
b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0
-
SHA512
3bf7e26bcd46e80d026f5b2d6fab82fcae56a3e380d9a88f2ee876539037016467adffbd01043e20191b5e83687457a4ce936178bdc38a49e493f55656537ac8
-
SSDEEP
3072:ObhQVe2GRs9ABW7z0QrTauJFFco5cAIp9BAVf2SR3b:HwFs9AsEQfC9jBAVfh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe
Files
-
b6baee7c17b0c7603c639172e6ff9f642ce4508ba64afedf969a3608204c64e0_JC.exe.exe windows x86
2c4cb94059866ce594e27750eee76a08
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetFilePointer
CreateFileA
TerminateThread
SetCurrentDirectoryA
GetFileSize
FileTimeToSystemTime
GetFileTime
FindClose
FindNextFileA
FindFirstFileA
CompareStringW
CompareStringA
GetLocaleInfoW
FlushFileBuffers
SetConsoleCtrlHandler
SetStdHandle
LoadLibraryA
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
CloseHandle
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetProcAddress
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
RtlUnwind
UnhandledExceptionFilter
GetCurrentThread
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetCurrentThreadId
VirtualAlloc
GetVersionExA
LoadLibraryW
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
Sleep
IsBadWritePtr
HeapReAlloc
VirtualFree
HeapCreate
HeapDestroy
FatalAppExitA
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetCurrentDirectoryA
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
InterlockedDecrement
InterlockedIncrement
HeapFree
GetLastError
ResumeThread
CreateThread
TlsSetValue
ExitThread
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
SetEnvironmentVariableA
user32
PeekMessageA
DispatchMessageA
CheckDlgButton
TranslateMessage
MessageBoxA
CreateDialogParamA
SetForegroundWindow
ShowWindow
SendMessageA
SetDlgItemTextA
GetCursorPos
TrackPopupMenu
DestroyMenu
LoadImageA
LoadMenuA
GetSubMenu
SetDlgItemInt
GetDlgItem
GetClientRect
DefWindowProcA
KillTimer
DestroyWindow
PostQuitMessage
LoadCursorA
LoadIconA
RegisterClassA
GetSystemMetrics
CreateWindowExA
DestroyIcon
DestroyCursor
SetTimer
GetDlgItemInt
GetDlgItemTextA
IsDlgButtonChecked
gdi32
DeleteObject
GetStockObject
shell32
Shell_NotifyIconA
wsock32
closesocket
send
listen
bind
htons
socket
recv
accept
WSAStartup
WSACleanup
comctl32
ord17
Exports
Exports
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ