Static task
static1
Behavioral task
behavioral1
Sample
282e926eb90960a8a807dd0b9e8668e39b38e6961b0023b09f8b56d287ae11cb_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
282e926eb90960a8a807dd0b9e8668e39b38e6961b0023b09f8b56d287ae11cb_JC.exe
Resource
win10v2004-20230831-en
General
-
Target
282e926eb90960a8a807dd0b9e8668e39b38e6961b0023b09f8b56d287ae11cb_JC.exe
-
Size
244KB
-
MD5
e49aaa9a5933c48feca39f3080a7b94d
-
SHA1
557820050eaed5f32241346caeefdfff0ce44745
-
SHA256
282e926eb90960a8a807dd0b9e8668e39b38e6961b0023b09f8b56d287ae11cb
-
SHA512
0ccbbfa7657560ee1cb6cb9361b192a778145cad03c17254979362ea0a083122ff086db00ab9822a2a837f369146c53be0c79f6701e4f77719b9a7aa14aff256
-
SSDEEP
3072:6nraIxNDMfFF8xzCh88D9XRr13BLYiwMOP6xaNlXq6aHJOZEe4deBHu195BSzjjW:sr3MfYE5Lsib46xaNoJO+KBHu37AOik
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 282e926eb90960a8a807dd0b9e8668e39b38e6961b0023b09f8b56d287ae11cb_JC.exe
Files
-
282e926eb90960a8a807dd0b9e8668e39b38e6961b0023b09f8b56d287ae11cb_JC.exe.exe windows x86
24bb4f25c4e20bb2f86f32a5b77aea70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
ReadFile
VirtualFree
VirtualAlloc
GetTempPathW
lstrlenA
lstrcmpA
CreateToolhelp32Snapshot
Sleep
Process32NextW
CreateFileA
lstrcatW
lstrcpyA
Process32FirstW
GetLastError
GetFileSize
CreateProcessW
WriteFile
CreateFileW
DeleteFileW
GetModuleHandleA
LoadLibraryA
GetProcAddress
SetEndOfFile
HeapSize
HeapReAlloc
ExitThread
CloseHandle
CreateMutexW
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
WideCharToMultiByte
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlUnwind
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
DuplicateHandle
GetStdHandle
GetModuleFileNameW
GetModuleHandleExW
HeapFree
HeapAlloc
GetFileType
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
WaitForSingleObject
GetExitCodeProcess
GetFileAttributesExW
CreatePipe
CompareStringW
WriteConsoleW
user32
MessageBoxA
wsprintfW
advapi32
CryptReleaseContext
CryptAcquireContextW
shell32
ShellExecuteW
SHGetFolderPathW
wininet
HttpOpenRequestW
InternetOpenW
HttpSendRequestW
InternetOpenUrlW
InternetReadFile
InternetConnectW
InternetCloseHandle
ws2_32
WSAGetLastError
htons
connect
socket
send
WSAStartup
gethostbyname
closesocket
WSACleanup
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE