Static task
static1
Behavioral task
behavioral1
Sample
2d5613ccaf35425ab284cbb727826280exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2d5613ccaf35425ab284cbb727826280exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2d5613ccaf35425ab284cbb727826280exe_JC.exe
-
Size
10KB
-
MD5
2d5613ccaf35425ab284cbb727826280
-
SHA1
97280ecf6ef67956ae161d5b42e8c640f86a13d6
-
SHA256
943c7c0e454ba71561c90eeb2b8f446538a69872269f8ca7338d7e0506ec0de9
-
SHA512
a7adcf06d296fee27ee615539fdc780133ca60ba4c2a7b9f9566400dd64acd3ed6caa6df575949b99a833d6f9f447a79b9671e9ef06dd37a4de7b46319352940
-
SSDEEP
96:3A/w7vqtNneZC+MU9aG/4kVDdaNuuFVg4ia//Bjqz3tMq8fa4qqNiZf:34c6nQCm4FkV4NbFVg03Bjqz3tAa4Rs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d5613ccaf35425ab284cbb727826280exe_JC.exe
Files
-
2d5613ccaf35425ab284cbb727826280exe_JC.exe.exe windows:4 windows x86
01c36987a9228f9e8485149e8273c4be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowThreadProcessId
FindWindowA
kernel32
GetSystemDirectoryA
lstrcpyA
lstrcatA
WriteProcessMemory
CloseHandle
CopyFileA
CreateFileA
CreateProcessA
CreateRemoteThread
ExitProcess
FindResourceA
GetCurrentProcess
GetEnvironmentVariableA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GlobalAlloc
GlobalFree
LoadResource
LockResource
OpenProcess
ResumeThread
RtlZeroMemory
SetFileAttributesA
SetPriorityClass
SetThreadPriority
SizeofResource
VirtualAllocEx
WriteFile
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 812B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ