Static task
static1
Behavioral task
behavioral1
Sample
eba21b87369f0120c14162aaf95550f5_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eba21b87369f0120c14162aaf95550f5_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
eba21b87369f0120c14162aaf95550f5_JC.exe
-
Size
4.4MB
-
MD5
eba21b87369f0120c14162aaf95550f5
-
SHA1
f0846a5259553eac9ac3d25f7ecb59c0fd38cba1
-
SHA256
2c23f1482c3e05ede8df70fb09cbf3a06879f22b30e94e5185d66a42081b9cf4
-
SHA512
a8d8782c71cd12a1e8822a13925a1ed8f633740433cb427e7b6129c1d85a4eca11bdeb7890748ab449d8ca8c187257fdc40e24966a1938f4830dfef713e84669
-
SSDEEP
98304:8QaxWk4wzxHtnM/x3FbMzKuu4v7RBUdiJTgaFZ4y:XaxWjcxHtM9ZMzKuugRBUdLy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eba21b87369f0120c14162aaf95550f5_JC.exe
Files
-
eba21b87369f0120c14162aaf95550f5_JC.exe.exe windows:4 windows x86
79b96456f9efc94c33ade5e8ec421b2f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
CloseHandle
CreateFileA
GetModuleFileNameA
Sleep
CreateThread
SetLastError
GetLastError
TerminateProcess
OpenProcess
ReadFile
GetFileSize
WriteFile
SetFilePointer
SetFileAttributesA
GetLocalTime
ResumeThread
SetThreadContext
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
IsBadReadPtr
FreeLibrary
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetThreadContext
CreateProcessA
GetCurrentDirectoryA
GetWindowsDirectoryA
MapViewOfFile
OpenFileMappingA
GetCommandLineA
GetModuleHandleA
GetTempFileNameA
GetTempPathA
DeleteFileA
CopyFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetProcessVersion
lstrcmpiA
WideCharToMultiByte
MultiByteToWideChar
user32
MessageBoxA
msvcrt
memcpy
??3@YAXPAX@Z
ftell
fclose
fread
fseek
strcpy
__CxxFrameHandler
_wcsnicmp
wcscpy
fwrite
time
memset
strcat
strlen
??2@YAPAXI@Z
_strnicmp
fopen
wcslen
_itoa
_wcsicmp
msvcp60
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBGABV?$allocator@G@1@@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?c_str@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 482KB - Virtual size: 482KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ