Static task
static1
Behavioral task
behavioral1
Sample
rjxhwwuksz.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
rjxhwwuksz.exe
Resource
win10v2004-20230703-en
General
-
Target
rjxhwwuksz.exe
-
Size
180KB
-
MD5
aac6551c6d24aae9319c3b266014cc71
-
SHA1
b06c33d1aeeee92f82201e9ee88a9a180fc289b2
-
SHA256
af09f110c5acbbd99aba815557d8347796308ff9624227b1120f0ad6cd679a50
-
SHA512
af3fdee562574caed655e24daf2df3fc3a1ecd2feaac6ee1c932482e1e96b0a180abfc3344188ef1ef97447e8567f48cedcae7bf4dacdcaf8f6b697c9deb525b
-
SSDEEP
3072:ihNFB5E9NkysdPJOm3tJO7V42qJjUeW0lU8Ag0Fuj+O2:MFBi8yyOGtq42MAOA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource rjxhwwuksz.exe
Files
-
rjxhwwuksz.exe.exe windows x86
230733e9038957851cf6095ba1fe375e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
imm32
ImmSetCompositionFontW
ImmSetStatusWindowPos
ImmUnregisterWordW
ImmEscapeW
ImmGetCompositionWindow
ImmGetCandidateListCountW
ImmIsUIMessageW
ImmGetCandidateListW
ImmSimulateHotKey
shlwapi
PathRemoveBackslashA
PathIsUNCW
StrRChrW
StrNCatW
kernel32
SetStdHandle
GetCommandLineA
GetOEMCP
GetProcessHeap
GetACP
HeapSize
IsValidCodePage
FindNextFileW
GetCommandLineW
FindClose
HeapReAlloc
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
FreeEnvironmentStringsW
CreateFileW
GetFileSize
ReadFile
GetEnvironmentStringsW
EnumSystemCodePagesW
VirtualAlloc
FindFirstFileExW
CloseHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileType
HeapAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
HeapFree
GetLastError
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
MultiByteToWideChar
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
RaiseException
RtlUnwind
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
WriteConsoleW
comdlg32
ReplaceTextW
GetSaveFileNameW
GetFileTitleA
msvfw32
DrawDibClose
DrawDibSetPalette
DrawDibGetPalette
GetOpenFileNamePreview
DrawDibRealize
GetOpenFileNamePreviewA
avifil32
AVIFileInfoA
AVIStreamBeginStreaming
AVIStreamGetFrameOpen
AVIMakeFileFromStreams
mpr
WNetUseConnectionW
WNetUseConnectionA
WNetCloseEnum
WNetOpenEnumA
WNetGetNetworkInformationA
WNetCancelConnection2A
WNetConnectionDialog1A
gdi32
CreateFontW
EnumObjects
DeleteColorSpace
GdiFlush
GdiResetDCEMF
GetEnhMetaFileDescriptionA
GetCharWidthA
SelectClipPath
loadperf
LoadPerfCounterTextStringsW
UnloadPerfCounterTextStringsA
wsock32
listen
ord1120
ord1102
htons
accept
closesocket
ntohl
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ