Static task
static1
Behavioral task
behavioral1
Sample
64f06be5a8407998f6786c062c3687d7_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
64f06be5a8407998f6786c062c3687d7_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
64f06be5a8407998f6786c062c3687d7_JC.exe
-
Size
391KB
-
MD5
64f06be5a8407998f6786c062c3687d7
-
SHA1
3bd34584b917e0f2dd8305ecb6b88b3846c53a6d
-
SHA256
caf9c708469b6eed519f01585d2b111533c16eb79f8e16ebe5f4acbd62172bf6
-
SHA512
b9a0303701802821750ef3cd5923e87da8df37bfa1eb6b8b75bfec9312f4a3cb5d07f0200808332c86db2cb7f485bc5cb5e9987bd0d9a5453aba1d01c1ae7738
-
SSDEEP
6144:VbeLGDvdavUJMAZ2DI0Ioi8dBNmOdT2GusIKpvVAOv/5T3Eoj7F8qibOCCwnkXc+:rDVavnVHwQeoTDHEDXcT3R
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 64f06be5a8407998f6786c062c3687d7_JC.exe
Files
-
64f06be5a8407998f6786c062c3687d7_JC.exe.exe windows:4 windows x86
9c3076658fe99e27b2a5d06cd805dc7e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
AllocConsole
CloseHandle
CreateProcessA
CreateSemaphoreA
CreateToolhelp32Snapshot
ExitProcess
FindAtomA
GetAtomNameA
GetCurrentThreadId
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetThreadContext
GetTickCount
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
Process32First
Process32Next
ReleaseSemaphore
ResumeThread
SetLastError
SetThreadContext
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
VirtualAllocEx
VirtualProtect
VirtualProtectEx
VirtualQuery
WaitForSingleObject
WriteProcessMemory
msvcrt
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
fclose
fopen
fread
free
freopen
fseek
ftell
malloc
memchr
memcpy
memmove
memset
printf
puts
rand
rewind
signal
srand
strcmp
strerror
system
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 512B - Virtual size: 312B
IMAGE_SCN_MEM_DISCARDABLE
/19 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_MEM_DISCARDABLE
/35 Size: 64KB - Virtual size: 64KB
IMAGE_SCN_MEM_DISCARDABLE
/47 Size: 6KB - Virtual size: 6KB
IMAGE_SCN_MEM_DISCARDABLE
/61 Size: 6KB - Virtual size: 6KB
IMAGE_SCN_MEM_DISCARDABLE
/73 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_MEM_DISCARDABLE
/86 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_DISCARDABLE
/97 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_MEM_DISCARDABLE
/108 Size: 1024B - Virtual size: 896B
IMAGE_SCN_MEM_DISCARDABLE