Static task
static1
Behavioral task
behavioral1
Sample
66c7c4b2c19757a382da1c170a7b3710_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
66c7c4b2c19757a382da1c170a7b3710_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
66c7c4b2c19757a382da1c170a7b3710_JC.exe
-
Size
234KB
-
MD5
66c7c4b2c19757a382da1c170a7b3710
-
SHA1
da9f86e2175b478a064ed7cc4589b492494dd781
-
SHA256
93e10a74a784dadb80d17db128a9a8863872846b41d71ba5ab2407c24a5d8e4d
-
SHA512
797cf89b2ea098a4e43a05f64536a206da287b2dd73531d877e52cc87444316c7db1b6773cba3a816b616cdf20d143365615f39d8555240ea42ed5e9cfd4593d
-
SSDEEP
6144:6ARYgKgwcgagArKvRuSRCgQOry503eOF4+v:6LwwcgacRuDgVP31y+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66c7c4b2c19757a382da1c170a7b3710_JC.exe
Files
-
66c7c4b2c19757a382da1c170a7b3710_JC.exe.exe windows:5 windows x86
3c6e5793e514214727b5614fbe758755
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameW
CreateFileW
GetFileSize
ReadFile
CloseHandle
VirtualAlloc
GetModuleHandleA
GetProcAddress
VirtualFree
GetProcessHeap
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 229KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE