Static task
static1
Behavioral task
behavioral1
Sample
586a18085369848fd7a62ea07721bbeaf4acb0abd56697ffeb3546f49c5ee017_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
586a18085369848fd7a62ea07721bbeaf4acb0abd56697ffeb3546f49c5ee017_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
586a18085369848fd7a62ea07721bbeaf4acb0abd56697ffeb3546f49c5ee017_JC.exe
-
Size
584KB
-
MD5
785dcca262cddcd033fed54d0e811a28
-
SHA1
474f5e5455b4a832aad2b95fafef4a6ef71b3075
-
SHA256
586a18085369848fd7a62ea07721bbeaf4acb0abd56697ffeb3546f49c5ee017
-
SHA512
f5d1cd7568edd34bdd38df0f6fb87e31c93f361a806d6f855b4a6400de7669a1e70b9ef196ce3be804703c6d3fb9d71ec59eeae40fa9ce22b3a1821a0fe8cb4e
-
SSDEEP
12288:IZhN0lAK0EkRE7Y4GBtRX3B7ltkiurpg81EP4:mOb0EEEMBtRXR7/zudg8h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 586a18085369848fd7a62ea07721bbeaf4acb0abd56697ffeb3546f49c5ee017_JC.exe
Files
-
586a18085369848fd7a62ea07721bbeaf4acb0abd56697ffeb3546f49c5ee017_JC.exe.exe windows:4 windows x86
acc4e0aa7a4945f630361d22cd43dcd5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DuplicateHandle
FindClose
GetVolumeInformationW
GetFullPathNameW
FileTimeToLocalFileTime
GetFileTime
SetErrorMode
GetTickCount
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
DeleteFileA
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
SetStdHandle
GetFileType
ExitProcess
ExitThread
CreateThread
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetFileSize
GetCommandLineA
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
FileTimeToSystemTime
GetThreadLocale
lstrlenA
GlobalFlags
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedIncrement
GetCurrentProcessId
CreateEventW
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
WritePrivateProfileStringW
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedDecrement
GetModuleFileNameW
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
FreeLibrary
CompareStringW
LoadLibraryA
lstrcmpW
GetVersionExA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
SetFileAttributesW
GetExitCodeProcess
LocalFree
FormatMessageW
CreateProcessW
GetCurrentProcess
VirtualProtectEx
ReadProcessMemory
WritePrivateProfileStringA
GetPrivateProfileStringA
FindNextFileW
FindFirstFileW
Module32NextW
Module32FirstW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
TerminateProcess
WaitForSingleObject
LocalFileTimeToFileTime
GetCurrentDirectoryW
CreateFileW
ReadFile
GetFileAttributesW
WriteFile
SetFileTime
CreateDirectoryW
SystemTimeToFileTime
SetFilePointer
TerminateThread
DeleteFileW
WriteProcessMemory
GetModuleHandleA
OpenProcess
CloseHandle
GetLastError
SetLastError
Sleep
CopyFileW
MapViewOfFile
CreateFileMappingW
LoadLibraryW
GetProcAddress
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
LockResource
InterlockedExchange
SizeofResource
LoadResource
FindResourceW
lstrlenW
LeaveCriticalSection
GetEnvironmentStringsW
EnterCriticalSection
user32
PostThreadMessageW
CopyAcceleratorTableW
CharNextW
ReleaseCapture
SetCapture
CharUpperW
UnregisterClassW
LoadCursorW
GetSysColorBrush
DestroyMenu
GetWindowThreadProcessId
SetCursor
GetMessageW
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
EndPaint
BeginPaint
GetWindowDC
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
GetPropW
RemovePropW
GetFocus
IsWindow
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
RegisterClipboardFormatW
SetForegroundWindow
UpdateWindow
GetMenu
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
GetParent
EqualRect
CopyRect
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
ClientToScreen
IsRectEmpty
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetWindowLongW
SetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfW
FindWindowW
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
AppendMenuW
GetSystemMenu
GetWindowRect
GetWindow
IsWindowVisible
LoadIconW
MessageBoxW
EnableWindow
RedrawWindow
InvalidateRect
ReleaseDC
SendMessageW
GetDC
SetPropW
UnregisterClassA
gdi32
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
CreateBitmap
CreateFontIndirectW
CreateRectRgnIndirect
GetMapMode
DPtoLP
GetBkColor
GetTextColor
GetRgnBox
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteDC
SetMapMode
SetStretchBltMode
RestoreDC
SaveDC
GetClipBox
GetDeviceCaps
GetStockObject
RemoveFontResourceW
CreateFontW
AddFontResourceW
SetBkColor
SetBkMode
SetTextColor
CreateSolidBrush
CreateCompatibleBitmap
GetObjectW
SetDIBColorTable
SelectObject
StretchBlt
DeleteObject
CreateDIBSection
CreateCompatibleDC
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegCreateKeyExW
RegOpenKeyW
RegCloseKey
RegQueryInfoKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
shell32
ShellExecuteExW
comctl32
InitCommonControlsEx
shlwapi
PathIsDirectoryW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathFileExistsW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoRegisterMessageFilter
CreateStreamOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysFreeString
SysStringLen
VariantInit
SysAllocStringLen
VariantClear
VariantChangeType
gdiplus
GdiplusShutdown
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipCreateBitmapFromFile
GdipGetImagePalette
GdipGetImagePaletteSize
GdiplusStartup
GdipFree
GdipAlloc
GdipDisposeImage
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipDrawImageI
GdipCloneImage
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
ws2_32
WSACleanup
freeaddrinfo
getaddrinfo
WSAStartup
recv
send
closesocket
connect
socket
wininet
InternetOpenW
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
uxtheme
SetWindowTheme
winmm
PlaySoundW
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
EnumProcesses
Sections
.text Size: 332KB - Virtual size: 329KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ