Static task
static1
Behavioral task
behavioral1
Sample
3e227c0902aa4b342888b2765a1bf504_JC.exe
Resource
win7-20230831-en
General
-
Target
3e227c0902aa4b342888b2765a1bf504_JC.exe
-
Size
367KB
-
MD5
3e227c0902aa4b342888b2765a1bf504
-
SHA1
09df4a5a364e632eeece47d2a7303ac1afd75ce5
-
SHA256
557f98ab09f5842387283e05a05d82997c540b06856c0cde53dd14a50143f39f
-
SHA512
db2d91950985f3dcd13d7a8c4bdb5a85696c9eb2903dfd4c41b7fcf1c6e50cd431eba0b246d923e1ff3d80ff4ebcc3079c1ed1c63e50f7ddcae6febced90c01b
-
SSDEEP
6144:xmfTClGiVDlhSsDCx5oD7n3Kpfh9VULNpIr7mi7enXtaeWq9jJWNbqDC:GOoi4xGDDO7qfIrCXdaTRNbF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3e227c0902aa4b342888b2765a1bf504_JC.exe
Files
-
3e227c0902aa4b342888b2765a1bf504_JC.exe.exe windows:5 windows x86
8333a39fbd5870e35deee3b4fbbd7cc0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
VirtualProtect
user32
GetDC
advapi32
RegCloseKey
shell32
ShellExecuteA
ws2_32
gethostbyaddr
iphlpapi
GetAdaptersInfo
wtsapi32
WTSRegisterSessionNotification
oleacc
LresultFromObject
gdi32
SaveDC
winspool.drv
OpenPrinterW
oleaut32
VariantClear
Sections
.text Size: 89KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 219KB - Virtual size: 241KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IKSDRFT Size: 25KB - Virtual size: 28KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE