Static task
static1
Behavioral task
behavioral1
Sample
c478cf95d8656782bd046f7280915c50exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c478cf95d8656782bd046f7280915c50exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
c478cf95d8656782bd046f7280915c50exe_JC.exe
-
Size
640KB
-
MD5
c478cf95d8656782bd046f7280915c50
-
SHA1
9ccaa4f2ad4d091fae88eba0dc4413ce44116c41
-
SHA256
b0616f4bd5f1b7ec2c32588bd22d99d6e44e547e7505fabc3b7a87ca25ea666b
-
SHA512
8d9d7e46ef8d0ae67e8af82cf292727555b02bc7b45fb98b97535a5d14f3e9b0ca7c834a6dcb07e216922008657980242a0401189efd4d9fdb4c33ebfb7fd821
-
SSDEEP
12288:a9SdOwaCasSeRQfn/uC6ElhvSTXPAL/Im6IRNnaY1Zos52jRDRJEX:TYIcn/uC6ElNSTpHIR9pZosw9o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c478cf95d8656782bd046f7280915c50exe_JC.exe
Files
-
c478cf95d8656782bd046f7280915c50exe_JC.exe.exe windows:4 windows x86
22013cd440e25248b4b8c84e303d339d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteW
SHGetFolderPathW
SHGetMalloc
SHFileOperationW
kernel32
SetCurrentDirectoryA
HeapSize
UnlockFile
GetProcessHeap
VirtualAlloc
VirtualProtect
SetEnvironmentVariableA
UnmapViewOfFile
GetVersionExW
WideCharToMultiByte
SetLastError
GetVersion
SetFileTime
WriteFile
SetUnhandledExceptionFilter
WaitForSingleObject
HeapReAlloc
GlobalDeleteAtom
GetCurrentThread
FormatMessageW
lstrcpynA
GetStringTypeA
IsBadWritePtr
LocalAlloc
SetStdHandle
GetSystemTime
GetStartupInfoA
GetStartupInfoW
InitializeCriticalSection
GetCPInfo
SetFilePointer
GetSystemInfo
TlsSetValue
IsValidCodePage
LockFile
GlobalUnlock
SetEvent
HeapFree
GetCommandLineW
SizeofResource
lstrcpyW
GetTempPathA
CreateMutexW
GetProcAddress
MulDiv
lstrlenW
FindClose
GetFileType
LCMapStringW
CreateFileA
QueryPerformanceCounter
GlobalFlags
GlobalHandle
CopyFileA
SetEndOfFile
CreateThread
GetLocaleInfoW
FreeLibrary
Sleep
SetThreadPriority
LocalFileTimeToFileTime
GetFullPathNameA
DeleteFileW
GetModuleFileNameW
GetCurrentProcessId
CreateDirectoryW
InterlockedDecrement
GetCurrentProcess
CompareStringW
FreeResource
GetVersionExA
GetCurrentThreadId
FlushInstructionCache
GetEnvironmentStringsW
GetTempPathW
DeleteFileA
FatalAppExitA
GetModuleFileNameA
CompareFileTime
LoadResource
CreateProcessA
DuplicateHandle
CreateDirectoryA
CompareStringA
MultiByteToWideChar
GetStdHandle
GlobalLock
GetCommandLineA
GetTimeFormatA
GetUserDefaultLCID
TlsAlloc
InterlockedExchange
ReadFile
ExitProcess
VirtualFree
lstrcmpW
GetOEMCP
GetSystemDirectoryA
HeapDestroy
GetDateFormatA
lstrcmpiW
HeapCreate
FreeEnvironmentStringsA
EnterCriticalSection
GetCurrentDirectoryA
GetExitCodeProcess
FreeEnvironmentStringsW
lstrcmpiA
ExitThread
GlobalSize
GetDriveTypeA
OutputDebugStringA
WriteConsoleA
LocalFree
GetFileTime
FileTimeToLocalFileTime
CreateMutexA
FormatMessageA
FlushFileBuffers
GetLocaleInfoA
SuspendThread
TerminateProcess
GetSystemTimeAsFileTime
DeleteCriticalSection
InterlockedIncrement
GetModuleHandleA
VirtualQuery
RaiseException
MoveFileW
TlsGetValue
LCMapStringA
FindFirstFileA
UnhandledExceptionFilter
InterlockedCompareExchange
GlobalAlloc
lstrlenA
GetACP
SystemTimeToFileTime
MapViewOfFile
GetTempFileNameA
LockResource
GetTimeZoneInformation
FindNextFileW
TlsFree
GetEnvironmentStrings
FindFirstFileW
GlobalReAlloc
SetErrorMode
LeaveCriticalSection
GetModuleHandleW
GetFileAttributesA
LoadLibraryA
lstrcmpA
GetLocalTime
IsValidLocale
CreateFileW
GetFileSize
ResumeThread
HeapAlloc
IsBadReadPtr
GetStringTypeW
GetTickCount
GetLastError
CopyFileW
SetHandleCount
CloseHandle
GetFullPathNameW
GetThreadLocale
FileTimeToSystemTime
IsDebuggerPresent
SetConsoleCtrlHandler
GlobalFree
IsBadCodePtr
RtlUnwind
user32
KillTimer
IsMenu
EndPaint
PostQuitMessage
GetWindowRect
BeginPaint
MapVirtualKeyW
SendMessageW
WindowFromPoint
EmptyClipboard
SetForegroundWindow
GetMenuState
ReleaseDC
DrawTextW
RegisterClassExW
GetLastActivePopup
GetKeyNameTextW
EnableMenuItem
GetCapture
GetDC
SetCapture
DrawStateW
DefWindowProcW
UnhookWindowsHookEx
GetKeyState
GetDesktopWindow
SetScrollPos
SystemParametersInfoA
MessageBeep
GetWindow
IsWindowEnabled
GetClipboardData
DrawFocusRect
SendMessageTimeoutW
ReleaseCapture
GetMenuItemInfoW
GetWindowDC
GetSystemMenu
ScreenToClient
DestroyIcon
GetWindowLongW
GetDlgCtrlID
PtInRect
SetMenuDefaultItem
IsClipboardFormatAvailable
SetRect
PeekMessageW
SetMenu
GetDlgItemInt
ChildWindowFromPoint
AppendMenuW
LoadCursorW
MessageBoxW
CallNextHookEx
GetMenuItemID
GetScrollInfo
GetParent
DestroyMenu
DeferWindowPos
IsDlgButtonChecked
SendDlgItemMessageA
EndDialog
DrawFrameControl
GetNextDlgTabItem
GetFocus
InvalidateRect
CallWindowProcW
SetWindowPlacement
TranslateMessage
SystemParametersInfoW
GetClientRect
SetTimer
SetWindowTextW
SetMenuItemInfoW
CopyRect
CheckDlgButton
ModifyMenuW
IsDialogMessageW
GetActiveWindow
LoadIconW
GetSystemMetrics
SetWindowPos
DialogBoxParamW
DrawIconEx
IsWindowVisible
FrameRect
SetClipboardData
ShowWindow
OpenClipboard
MapWindowPoints
DestroyWindow
SetCursor
GetTopWindow
GetWindowPlacement
RegisterClassW
UpdateWindow
GetMessageW
GetMenuItemCount
DrawEdge
FillRect
GetMenu
GetWindowTextW
SetDlgItemInt
SetWindowLongW
CheckMenuItem
UnregisterClassA
DragDetect
GetDlgItemTextW
EnableWindow
CreateWindowExW
LoadStringW
GetSysColor
IsIconic
GetAsyncKeyState
TrackPopupMenu
advapi32
RegEnumValueA
GetUserNameA
SetSecurityDescriptorDacl
DeleteService
RegisterServiceCtrlHandlerA
SetServiceStatus
RegCreateKeyA
StartServiceCtrlDispatcherA
OpenProcessToken
RegOpenKeyA
DeregisterEventSource
RegDeleteKeyA
RegSetValueExW
GetTokenInformation
RegDeleteValueA
AllocateAndInitializeSid
CloseServiceHandle
RegQueryValueExW
RegQueryInfoKeyA
OpenThreadToken
RegQueryValueExA
InitializeSecurityDescriptor
RegCreateKeyExA
CopySid
ControlService
RegOpenKeyExA
RegSetValueExA
GetLengthSid
FreeSid
RegCloseKey
RegEnumKeyExA
comdlg32
GetSaveFileNameA
ChooseFontA
shlwapi
PathIsUNCA
PathAppendA
PathFindFileNameA
gdi32
DeleteDC
CreateCompatibleBitmap
CreatePolygonRgn
GetTextExtentPoint32W
LineTo
GetMapMode
CreateDCW
StretchDIBits
GetObjectW
SetWindowExtEx
GetStockObject
SelectObject
AbortDoc
TextOutW
BitBlt
GetDeviceCaps
GetTextColor
SetViewportExtEx
GetBkColor
CreatePatternBrush
MoveToEx
OffsetViewportOrgEx
SelectClipRgn
Polygon
RestoreDC
SetViewportOrgEx
ExtCreatePen
SaveDC
SetBkMode
GetPaletteEntries
SetROP2
CombineRgn
DeleteObject
CreateCompatibleDC
GetDIBits
IntersectClipRect
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 456KB - Virtual size: 455KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ