Static task
static1
Behavioral task
behavioral1
Sample
d6135feb2042f98554a43d8860f34043_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d6135feb2042f98554a43d8860f34043_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
d6135feb2042f98554a43d8860f34043_JC.exe
-
Size
1.3MB
-
MD5
d6135feb2042f98554a43d8860f34043
-
SHA1
803e1213fcaadf254eaba9fb255c9bfb553a2cea
-
SHA256
9d56b64d4d0aab29d1523d9b5b5608817afa2b1a7495311560d0b159d3f9ebd1
-
SHA512
6e8a34c4b1de93f56d89446a75d72d5dd7d5aabb7b55a5854230cee221d00f2bfd408cce0666832f2c36e002e9df5799c1c7bb4f39ca8558b6d83f985bf8171a
-
SSDEEP
24576:xldkT3ceWNGTsMY1zEd5IrKoW3UsLMtU4Fi:f+TMJM8EdYKoW3f4V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d6135feb2042f98554a43d8860f34043_JC.exe
Files
-
d6135feb2042f98554a43d8860f34043_JC.exe.exe windows:5 windows x86
298d09ab5d86afc52f146e73a3e1d347
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
GetCurrentProcessId
LoadLibraryA
lstrcatA
CloseHandle
ReadFile
CreateFileA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetLastError
InterlockedIncrement
InterlockedDecrement
DeleteFileA
GetWindowsDirectoryA
GetTempPathA
CreateDirectoryA
MultiByteToWideChar
GetSystemInfo
GetCurrentProcess
QueryPerformanceCounter
TerminateProcess
WideCharToMultiByte
WriteProcessMemory
WriteFile
RemoveDirectoryA
SetFilePointer
GetTickCount
GetProcessHeap
SetEndOfFile
GetStringTypeW
GetStringTypeA
InitializeCriticalSectionAndSpinCount
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
GetLocaleInfoA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
ExitProcess
GetModuleFileNameA
GetSystemDirectoryA
lstrcpyA
Sleep
GetModuleHandleA
GetProcAddress
GetLastError
HeapSize
LCMapStringW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
GetStdHandle
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
LCMapStringA
user32
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadIconA
LoadCursorA
RegisterClassExA
PostQuitMessage
BeginPaint
GetClientRect
DrawTextA
EndPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
GetDesktopWindow
EndDialog
CreateWindowExA
ShowWindow
UpdateWindow
LoadStringA
advapi32
QueryServiceStatus
shell32
ShellExecuteA
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsdt Size: 1019KB - Virtual size: 1020KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ