destroy
getWindow
show
Static task
static1
Behavioral task
behavioral1
Sample
4b65cedc2e5755053934ba767d067460_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4b65cedc2e5755053934ba767d067460_JC.dll
Resource
win10v2004-20230915-en
Target
4b65cedc2e5755053934ba767d067460_JC.exe
Size
14KB
MD5
4b65cedc2e5755053934ba767d067460
SHA1
e299351911b4826d66695b0b2d80c96162563dca
SHA256
d6799ce2644c1897671736d709818fec99004c71959e38725300bf77b18dffd9
SHA512
76dc8ddec9822b96599ffc536fb3d69b8628b83ddfc6975b9e8af8c1bf6d12ec62818f239d8141a930d1f5a5c8e1d714fff58f5d80f6df7485d1b7a130184d30
SSDEEP
192:bAfhCpBEyMW7x0KDWpHFtH6cAAANa3Gy2sE9jP/CVX0irnnnnnGi2d8XR4+5B4:YCJMUvDGFtart8E9r/Ni22z4
Checks for missing Authenticode signature.
resource |
---|
4b65cedc2e5755053934ba767d067460_JC.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyW
GetModuleHandleW
CloseHandle
Sleep
CreateThread
GetCurrentThreadId
GlobalFree
lstrcmpW
lstrcpynW
GlobalAlloc
DestroyWindow
SetWindowLongW
GetWindowLongW
SetWindowTextW
SetDlgItemTextW
DispatchMessageW
PeekMessageW
WaitMessage
IsWindow
CreateDialogParamW
ShowWindow
AttachThreadInput
IsWindowVisible
wsprintfW
PostMessageW
destroy
getWindow
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ