Static task
static1
Behavioral task
behavioral1
Sample
JC_08464ec17ba8354422ec0a7cc496bc1b9855e0462a7d9518050a7bbb99773789.exe
Resource
win7-20230831-en
General
-
Target
JC_08464ec17ba8354422ec0a7cc496bc1b9855e0462a7d9518050a7bbb99773789
-
Size
4.2MB
-
MD5
23065f404c6dab68852f5a3bce19cc39
-
SHA1
e5d88a54a05cd11ede45a5496f69d767cd047cd6
-
SHA256
08464ec17ba8354422ec0a7cc496bc1b9855e0462a7d9518050a7bbb99773789
-
SHA512
a17fe1c203db959fa773d809258e6008b423f5f320f33afef0c91b721476dbee34edce520f8afb62a27ccb62a053227cf0f274e18376f4206efd6aa6217c4761
-
SSDEEP
98304:YRz7mkfbzAUXChyCWYMmB6IxjWuNmst05WInW9PY:yz7TD9Ch8lKwkm9PnWFY
Malware Config
Signatures
Files
-
JC_08464ec17ba8354422ec0a7cc496bc1b9855e0462a7d9518050a7bbb99773789.exe windows:5 windows x86
f0a034e77f89fb3d2197b3cf4e1e7f3d
Code Sign
72:97:95:b3:1b:32:e4:0f:6a:b7:9f:a8:81:80:8d:b5Certificate
IssuerCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10700,ST=0b1c1115005f5c4e0f020a1000040b144b0114+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bNot Before30/08/2023, 09:29Not After29/08/2024, 09:29SubjectCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10700,ST=0b1c1115005f5c4e0f020a1000040b144b0114+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070b6a:50:31:57:ae:ab:99:2f:1d:26:8d:f1:25:6b:08:98:d0:14:d4:d7:60:12:fc:2a:26:dd:dc:b7:6b:af:9d:c8Signer
Actual PE Digest6a:50:31:57:ae:ab:99:2f:1d:26:8d:f1:25:6b:08:98:d0:14:d4:d7:60:12:fc:2a:26:dd:dc:b7:6b:af:9d:c8Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumaProcessorNode
GetConsoleAliasExesA
BuildCommDCBAndTimeoutsA
DeleteVolumeMountPointA
InterlockedIncrement
GetConsoleAliasA
HeapFree
OpenSemaphoreA
GetTickCount
EnumTimeFormatsW
GetDriveTypeA
AllocateUserPhysicalPages
GlobalAlloc
GetPrivateProfileIntA
SetFileShortNameW
LoadLibraryW
IsValidLocale
GetConsoleAliasW
RaiseException
CreateJobObjectA
EnumSystemLocalesA
InterlockedExchange
GetStartupInfoA
GetHandleInformation
GetCurrentDirectoryW
SetLastError
ReadConsoleOutputCharacterA
PeekConsoleInputW
EnumDateFormatsExW
LoadLibraryA
OpenMutexA
InterlockedExchangeAdd
SetCalendarInfoW
MoveFileA
RemoveDirectoryW
GlobalGetAtomNameW
AddAtomA
EnumResourceTypesW
GetPrivateProfileSectionNamesA
FindNextFileA
GlobalUnWire
GetModuleHandleA
FatalExit
FreeEnvironmentStringsW
FindNextFileW
RequestWakeupLatency
VirtualProtect
GetCurrentDirectoryA
FatalAppExitA
OpenSemaphoreW
FindFirstVolumeA
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
EnumCalendarInfoExA
CommConfigDialogW
GetFileSize
GetCommandLineW
MoveFileW
GetVolumeNameForVolumeMountPointA
CloseHandle
CreateFileW
WideCharToMultiByte
InterlockedDecrement
InterlockedCompareExchange
MultiByteToWideChar
GetStringTypeW
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
DeleteFileA
HeapSetInformation
GetStartupInfoW
GetCPInfo
RtlUnwind
HeapAlloc
LCMapStringW
IsProcessorFeaturePresent
HeapCreate
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetStdHandle
WriteConsoleW
gdi32
GetCharABCWidthsA
SelectPalette
GetTextFaceA
shell32
DuplicateIcon
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 30.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ