Static task
static1
Behavioral task
behavioral1
Sample
Jaws_Visualization_Plugin.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Jaws_Visualization_Plugin.exe
Resource
win10v2004-20230915-en
General
-
Target
Jaws_Visualization_Plugin.exe
-
Size
1.5MB
-
MD5
daf5dd7cfc753116cfc9a78c6b116eea
-
SHA1
21a7f0b9751804bb8666e99e5e5aa3eea419c8e4
-
SHA256
6806e1729ab66c5cdaf647dc21de8eb23083e88bac58e5649dd8ec9dea198373
-
SHA512
5752ddb8d8b0f6654c9654ffbb6c154c596408ff1185ac7b6afa585b4dbe665950e0e7e1892758603b66278fd6bcfffadfe06c0a44a9ce7ea6297b247dc141cf
-
SSDEEP
24576:4P13ZZRqRdCxlY49B8dRbwq1Tb3JJxAkBlR36E4huGeC4aL7LL8g7i0P:4P13Z1lxidV1+ylR3J4UnaLnw0P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Jaws_Visualization_Plugin.exe
Files
-
Jaws_Visualization_Plugin.exe.exe windows x86
c9268a83fd14fa04a25c08f6986d6a3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
GetModuleFileNameA
GetSystemDirectoryA
GetPrivateProfileStringA
DeleteFileA
CreateDirectoryA
GetWindowsDirectoryA
CreateProcessA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
GlobalFree
GetModuleHandleA
WriteFile
GlobalAlloc
user32
ShowWindow
GetDlgItem
EnableWindow
SetWindowTextA
EndDialog
LoadIconA
GetDesktopWindow
SendMessageA
GetDlgItemTextA
SetClassLongA
SendDlgItemMessageA
SetDlgItemTextA
CharPrevA
MessageBoxA
wsprintfA
DialogBoxParamA
gdi32
DeleteObject
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
Sections
.text Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ