Static task
static1
Behavioral task
behavioral1
Sample
JC_1826c3303ce03aad87ec6a6f61837724e75521415120c95f96415c89ee813c0b.exe
Resource
win7-20230831-en
General
-
Target
JC_1826c3303ce03aad87ec6a6f61837724e75521415120c95f96415c89ee813c0b
-
Size
4.2MB
-
MD5
14ed7bf2e387db2fb8117a85df1850f9
-
SHA1
f3b1ddf3fae19c48fc124591716ff66061d7dfd4
-
SHA256
1826c3303ce03aad87ec6a6f61837724e75521415120c95f96415c89ee813c0b
-
SHA512
a769b8fcb5c1eb4e748f3d8285fde4fa343050fe875c200c34f52a64f399aa10e74991d9253574e537b6d28017edb26a69b1fee5fc96802b73dd7b1bf50431c7
-
SSDEEP
98304:2bTtQ+VsE0P762G3AM0QPc8yX+l5bvmSybp1VENLNn5RGRbFPM:MBQh762G3AcyX+lhe3CLJKo
Malware Config
Signatures
Files
-
JC_1826c3303ce03aad87ec6a6f61837724e75521415120c95f96415c89ee813c0b.exe windows:5 windows x86
e9cacac7b73883427b68f7dd17217393
Code Sign
86:7a:44:f2:e3:71:10:a5:85:29:ef:01:f4:dd:28:fbCertificate
IssuerCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10812,ST=0b1c1115005f5c4e11021f0b0117101c1c064f1a1102+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070bNot Before26/08/2023, 13:03Not After25/08/2024, 13:03SubjectCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10812,ST=0b1c1115005f5c4e11021f0b0117101c1c064f1a1102+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070b3a:c0:93:db:90:ed:c4:92:74:f8:9c:47:d2:eb:d3:4b:a9:6c:6a:94:f9:ab:ee:a2:b8:ea:39:fa:0f:e8:17:f7Signer
Actual PE Digest3a:c0:93:db:90:ed:c4:92:74:f8:9c:47:d2:eb:d3:4b:a9:6c:6a:94:f9:ab:ee:a2:b8:ea:39:fa:0f:e8:17:f7Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
ReadConsoleA
InterlockedDecrement
GetCurrentProcess
SetDefaultCommConfigW
GetModuleHandleW
GetConsoleAliasesLengthA
GetConsoleTitleA
ClearCommBreak
GetEnvironmentStrings
SizeofResource
GetSystemWindowsDirectoryA
SetComputerNameExW
FindFirstFileA
GetLastError
SetLastError
GetProcAddress
FindVolumeMountPointClose
VirtualAlloc
GlobalMemoryStatus
VirtualAllocEx
LoadLibraryA
InterlockedExchangeAdd
CreateHardLinkW
SetConsoleCtrlHandler
SetEnvironmentVariableA
GetOEMCP
DebugSetProcessKillOnExit
GetModuleHandleA
FreeEnvironmentStringsW
SetProcessShutdownParameters
DeleteAtom
AddConsoleAliasA
AreFileApisANSI
CloseHandle
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CopyFileA
WideCharToMultiByte
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetACP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
GetLocaleInfoW
user32
CharUpperBuffW
OemToCharA
LoadMenuW
GetSysColorBrush
GetCaretBlinkTime
ChangeMenuW
advapi32
BackupEventLogA
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 31.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ