Static task
static1
Behavioral task
behavioral1
Sample
JC_04dd75cfe49c9a736188c8767c8931432b60b00456fc39c02c1dc624fa613c60.exe
Resource
win7-20230831-en
General
-
Target
JC_04dd75cfe49c9a736188c8767c8931432b60b00456fc39c02c1dc624fa613c60
-
Size
4.2MB
-
MD5
a6853c23dcd18911bd436a331968c58e
-
SHA1
cb9ddd9df0406c11ada46252fb95d54e6b856ade
-
SHA256
04dd75cfe49c9a736188c8767c8931432b60b00456fc39c02c1dc624fa613c60
-
SHA512
c8c4f5b0b5ff81b737e3fd30ce2b6c2d2582b99c490be55fbe3ff25394e4302a921f89713824a581afa9fe5500b34b6a77ff2b465f0a0fdb3142e823c738619e
-
SSDEEP
98304:YHzKFRmjVbT8IBUCbguVgPkCz4q0XWBzSmfmi7R+mJcu:qKjSHisVgPkn5WWmf1L
Malware Config
Signatures
Files
-
JC_04dd75cfe49c9a736188c8767c8931432b60b00456fc39c02c1dc624fa613c60.exe windows:5 windows x86
16c068b6037581e4b3fc2bd08becf79f
Code Sign
42:00:40:0e:63:53:21:3e:2e:67:d1:65:cc:dc:22:5dCertificate
IssuerCN=522303292b2005041027200a5d5d12051031230d161c143d24542553452740323d28,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b061d170a03165d111c0016+ST=0b1c1115494a5c11101704105c1f07410b17550d0e1c0c5a070a090e025212541c510f17091909155406121d141b0850180d0a16140e53100100171b1d12055b0c0b0a070bNot Before27/08/2023, 21:17Not After26/08/2024, 21:17SubjectCN=522303292b2005041027200a5d5d12051031230d161c143d24542553452740323d28,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b061d170a03165d111c0016+ST=0b1c1115494a5c11101704105c1f07410b17550d0e1c0c5a070a090e025212541c510f17091909155406121d141b0850180d0a16140e53100100171b1d12055b0c0b0a070b7d:c6:8d:83:d3:dd:4a:ca:6d:03:4b:12:d4:c7:79:fa:2b:cb:f6:4d:bd:3e:55:28:6d:b9:02:4a:c9:6c:90:c2Signer
Actual PE Digest7d:c6:8d:83:d3:dd:4a:ca:6d:03:4b:12:d4:c7:79:fa:2b:cb:f6:4d:bd:3e:55:28:6d:b9:02:4a:c9:6c:90:c2Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
PeekNamedPipe
InterlockedDecrement
GetCurrentProcess
SetDefaultCommConfigW
GetSystemWindowsDirectoryW
SetEnvironmentVariableW
GetModuleHandleW
GetConsoleAliasesLengthA
GetConsoleTitleA
SizeofResource
GetConsoleAliasExesLengthW
SetComputerNameExW
GetVolumePathNameA
FindFirstFileA
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
FindFirstChangeNotificationW
VirtualAllocEx
LoadLibraryA
InterlockedExchangeAdd
BuildCommDCBAndTimeoutsW
CreateHardLinkW
SetConsoleCtrlHandler
GetOEMCP
GetModuleHandleA
FreeEnvironmentStringsW
GetShortPathNameW
FileTimeToLocalFileTime
FindFirstVolumeW
QueryDepthSList
AddConsoleAliasA
AreFileApisANSI
CreateFileA
CloseHandle
WriteConsoleW
CopyFileA
WideCharToMultiByte
InterlockedIncrement
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetACP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
user32
CharUpperBuffW
OemToCharA
LoadMenuW
ChangeMenuW
advapi32
BackupEventLogA
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 31.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ