Static task
static1
Behavioral task
behavioral1
Sample
abcc94579a681b4883a73a0029bee0e0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
abcc94579a681b4883a73a0029bee0e0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
abcc94579a681b4883a73a0029bee0e0_JC.exe
-
Size
217KB
-
MD5
abcc94579a681b4883a73a0029bee0e0
-
SHA1
9f99ee9225b0e0732e2e0dedbf13c2fc53445d34
-
SHA256
2c80349a74765c2a159862d18497249b57c48bbe939fa2396aac133445a4144e
-
SHA512
f8927b19099ca1781632dc97c62c920e97a227ea471ddc55e61a9fefc974a6817a2159e6db03cbaa1c295e73f41300462f336580ff17bb191fdf54656b15dc31
-
SSDEEP
3072:4HpyEHspXHO8PRghWZUannPQoTXMKY4cEXoJZ6+UwQGty:4HpcXHOIRghWZ59TXMce9Qn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abcc94579a681b4883a73a0029bee0e0_JC.exe
Files
-
abcc94579a681b4883a73a0029bee0e0_JC.exe.exe windows:4 windows x86
b182675bdf4aa38b3fc646cccf526a32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetFileAttributesA
RtlUnwind
HeapSize
GetTimeZoneInformation
GetSystemTime
GetStartupInfoA
ExitProcess
HeapAlloc
HeapFree
CreateThread
ExitThread
RaiseException
HeapReAlloc
GetACP
HeapDestroy
HeapCreate
VirtualFree
FlushFileBuffers
IsBadWritePtr
SetStdHandle
GetFileType
SetHandleCount
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetExitCodeProcess
CreateProcessA
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetFilePointer
WriteFile
ReadFile
SetErrorMode
GetOEMCP
GetCPInfo
WritePrivateProfileStringA
GlobalFlags
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpynA
SetLastError
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
SuspendThread
GetCurrentThreadId
SetThreadPriority
ResumeThread
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDrives
GetDriveTypeA
WinExec
RemoveDirectoryA
OpenProcess
TerminateProcess
MoveFileA
CreateDirectoryA
Sleep
MulDiv
OpenMutexA
CreateMutexA
CopyFileA
SetFileAttributesA
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
WaitForSingleObject
ResetEvent
SetEvent
DeleteFileA
GetTempPathA
GetLocalTime
CreateEventA
GetComputerNameA
GetModuleFileNameA
CreateFileA
CloseHandle
VirtualAlloc
user32
PtInRect
DestroyMenu
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
ClientToScreen
ShowWindow
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
CopyRect
GetClassNameA
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetDlgCtrlID
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
GetMessageTime
GetMessagePos
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
LoadStringA
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
UnregisterClassA
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
GetSysColorBrush
LoadCursorA
TranslateMessage
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
ExitWindowsEx
GetForegroundWindow
GetWindowTextA
GetSystemMenu
EnableWindow
IsIconic
GetSystemMetrics
DrawIcon
GetMessageA
DispatchMessageA
LoadIconA
RegisterClassExA
CreateWindowExA
DefWindowProcA
FindWindowA
FindWindowExA
SendMessageTimeoutA
IsWindow
SendMessageA
GetDesktopWindow
GetClientRect
GetDC
ReleaseDC
RemovePropA
gdi32
RectVisible
TextOutA
ExtTextOutA
Escape
ScaleWindowExtEx
PtVisible
DeleteDC
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
RealizePalette
SetStretchBltMode
StretchBlt
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDIBits
DeleteObject
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
GetUserNameA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
comctl32
ord17
ole32
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
OleLoadPictureFile
SysAllocStringLen
SysFreeString
ws2_32
getsockname
recv
ioctlsocket
accept
send
closesocket
inet_addr
htons
socket
WSAGetLastError
WSACleanup
inet_ntoa
gethostbyname
connect
WSAStartup
setsockopt
avicap32
capCreateCaptureWindowA
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wmhlfxs Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE