Static task
static1
Behavioral task
behavioral1
Sample
JC_ad6621ce0d4a42e57ac4af4dc848088423d7655562781f777376caf7b6b98092.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
JC_ad6621ce0d4a42e57ac4af4dc848088423d7655562781f777376caf7b6b98092.exe
Resource
win10v2004-20230831-en
General
-
Target
JC_ad6621ce0d4a42e57ac4af4dc848088423d7655562781f777376caf7b6b98092
-
Size
769KB
-
MD5
8b5c1c1244e507e43f8bba5f786d7152
-
SHA1
b41c7c5c825f4fca3290b036414bef3a4297cea4
-
SHA256
ad6621ce0d4a42e57ac4af4dc848088423d7655562781f777376caf7b6b98092
-
SHA512
692cbcc394d653e5437a1d4fb8d78695a184c1e2739a9a3c69b303d694fc769ce11985615b1548c9775b3979ce4a74f664e92ac7010c8366e3a78a7452bd6a1a
-
SSDEEP
24576:diuDy5HLkiNE+hDjb3D8tzNbMWZXpHR49HIBS:diuokiNJj+zLR4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JC_ad6621ce0d4a42e57ac4af4dc848088423d7655562781f777376caf7b6b98092
Files
-
JC_ad6621ce0d4a42e57ac4af4dc848088423d7655562781f777376caf7b6b98092.exe windows x86
d486cf0d009e476ba5dbcd1e658bee6d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
SetDefaultCommConfigA
SetFilePointer
GetConsoleAliasesLengthW
GetConsoleAliasExesLengthA
GetCurrentProcess
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
InterlockedCompareExchange
CreateHardLinkA
FreeEnvironmentStringsA
ReadConsoleW
ClearCommBreak
CopyFileW
SizeofResource
GetConsoleAliasesW
FindFirstFileA
GetLastError
GetProcAddress
VirtualAlloc
LocalLock
GetDateFormatW
GetTempFileNameA
LoadLibraryA
InterlockedExchangeAdd
SetConsoleCtrlHandler
SetFileApisToANSI
GlobalWire
GetOEMCP
DebugSetProcessKillOnExit
GetModuleHandleA
FatalExit
FindNextFileW
WaitForDebugEvent
SetProcessShutdownParameters
DeleteAtom
AddConsoleAliasA
CloseHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
VirtualAllocEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
ExitProcess
GetStartupInfoW
RaiseException
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
GetCPInfo
GetACP
IsValidCodePage
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
HeapSize
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
CharUpperBuffA
LoadMenuW
GetSysColorBrush
FlashWindow
GetCaretBlinkTime
OemToCharA
advapi32
BackupEventLogW
Sections
.text Size: 665KB - Virtual size: 664KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 31.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ