Static task
static1
Behavioral task
behavioral1
Sample
c076093157c6bf282f208e2f3befa6b0exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c076093157c6bf282f208e2f3befa6b0exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
c076093157c6bf282f208e2f3befa6b0exe_JC.exe
-
Size
84KB
-
MD5
c076093157c6bf282f208e2f3befa6b0
-
SHA1
7dfbe4d19cf2b719451a29b0315e0a41968abda5
-
SHA256
d5a222460972444e4f348396dc94406ffd7619296264bef4f4c0c7ec7a8a574e
-
SHA512
882967e37900ee42b12b28133b45fe94d06258b81343872e042483b3f41e4200f83c64a543c583a481a12db0030350a3330fd25f72b8055a8af44c283a1faf67
-
SSDEEP
1536:DAx5CkbMJTKWbzZhKoJaWhL4FlcnjTUMd0qdSc8YaEJwZK4/83ZoMOAI:MzbMJTKWbzZUoviFEUMdmhZEXtpxI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c076093157c6bf282f208e2f3befa6b0exe_JC.exe
Files
-
c076093157c6bf282f208e2f3befa6b0exe_JC.exe.exe windows:4 windows x86
1302df5056ebead76c150e2bb8433430
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
SetConsoleCursorMode
GlobalGetAtomNameA
ValidateLCType
CreateFiberEx
GetDllDirectoryW
GetProfileSectionA
Toolhelp32ReadProcessMemory
MulDiv
CreateProcessA
SetComputerNameW
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.krdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE