Static task
static1
Behavioral task
behavioral1
Sample
14152e3563b0773b8147ad7b458c4958_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
14152e3563b0773b8147ad7b458c4958_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
14152e3563b0773b8147ad7b458c4958_JC.exe
-
Size
257KB
-
MD5
14152e3563b0773b8147ad7b458c4958
-
SHA1
302c7f4b1f0299b1894e6d3bc75455cea6c94ff9
-
SHA256
275cdf6f4e9a2f69a08dfb13eedf925be2a07d39291bcaf310000c45dcac3fb0
-
SHA512
c539c7f169e541cdc69c4f510205a484c4ef12c549ccced50a73d82cb27813c48549db715638d91c971fb421bcce83d940a00b9a0aa3d4c5c219f3915cdbe34a
-
SSDEEP
6144:4SrJ0lZ9wacHLR8XtrBu83meiQLGTySgO6G8N4zqm8qXe:07cHyXN3WeONd6XyzS6e
Malware Config
Signatures
Files
-
14152e3563b0773b8147ad7b458c4958_JC.exe.exe windows:4 windows x86
5397205b026fa29a895b23f2b67493c1
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1c:2d:d6:1a:35:e6:5d:f6:29:97:01:ff:9b:e5:ca:44Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before20/01/2010, 00:00Not After24/01/2012, 23:59SubjectCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
96:b4:bd:b4:c4:5d:44:a7:d4:57:0a:4c:a1:13:37:3f:b8:23:15:fdSigner
Actual PE Digest96:b4:bd:b4:c4:5d:44:a7:d4:57:0a:4c:a1:13:37:3f:b8:23:15:fdDigest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFindAtomW
GetLogicalDrives
lstrlen
GetSystemDefaultLCID
SystemTimeToFileTime
GetModuleHandleW
ExpandEnvironmentStringsW
GetTimeFormatA
SetLocaleInfoA
GetCurrentProcessId
SetErrorMode
lstrcmpi
GetVolumeInformationA
FlushFileBuffers
IsDebuggerPresent
OpenWaitableTimerW
lstrcmpW
SetLastError
LocalFree
lstrcatA
GetProcessHeap
CreateThread
GetFullPathNameA
DuplicateHandle
GetHandleInformation
CreateMutexA
FatalAppExitW
lstrcmpiA
GlobalDeleteAtom
SetComputerNameW
VirtualAlloc
GetLogicalDriveStringsA
GlobalGetAtomNameA
GetDateFormatA
GetUserDefaultLangID
IsBadWritePtr
GetWindowsDirectoryW
lstrcatW
GetSystemInfo
GetTempPathW
WaitForMultipleObjects
lstrcmpiW
GetOEMCP
GetUserDefaultLCID
CreateFileMappingW
GetFileType
user32
PeekMessageW
DrawIcon
DestroyCursor
EnumWindows
DialogBoxIndirectParamW
InsertMenuItemW
GetMenuStringA
LoadMenuIndirectA
InsertMenuA
IsChild
ShowWindow
CreateDialogIndirectParamA
GetMenuItemInfoA
GetActiveWindow
PostMessageW
WaitMessage
GetDC
LoadCursorW
CreateMenu
UnregisterClassA
LoadIconW
ShowCursor
GetClassLongA
CopyIcon
SendDlgItemMessageA
wsprintfW
GetDlgItem
CreatePopupMenu
SetDlgItemTextA
RegisterClassW
GetWindowLongW
DestroyIcon
SetForegroundWindow
gdi32
ResetDCW
RestoreDC
ExtTextOutA
SetPixelFormat
GetDeviceCaps
PolyBezierTo
SetDCPenColor
GetSystemPaletteEntries
CombineRgn
advapi32
RegOpenKeyA
ConvertSidToStringSidW
RegOpenKeyExW
RegFlushKey
shell32
StrRStrIA
opengl32
glRasterPos3s
glEdgeFlagPointer
wglCreateContext
glIndexdv
glMatrixMode
glTexCoord3s
glCopyPixels
glNormal3iv
glTranslatef
glTexImage1D
urlmon
HlinkGoBack
winspool.drv
GetPrinterDriverDirectoryW
AddPortExA
SetPortW
AddMonitorA
QuerySpoolMode
AdvancedSetupDialog
EXTDEVICEMODE
EnumPrintersW
EnumFormsA
GetPrinterDataA
wsock32
WSAGetLastError
WSARecvEx
getprotobynumber
htonl
GetServiceW
recvfrom
SetServiceA
setsockopt
send
gethostbyname
ntohl
closesocket
WSAAsyncGetServByName
Sections
.Qcye Size: 10KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Lu Size: 1KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ezwBk Size: 2KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.e Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.n Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.EgTx Size: 1024B - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aeO Size: 2KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JRJAcn Size: 2KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.z Size: 1024B - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LLNzNd Size: 3KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.GjlsiW Size: 1KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ