Static task
static1
Behavioral task
behavioral1
Sample
JC_0c9c2baf05c8afca3dd3d461f1b7d95bff65c26d0025c83add2ff9dd24b39ba2.exe
Resource
win7-20230831-en
General
-
Target
JC_0c9c2baf05c8afca3dd3d461f1b7d95bff65c26d0025c83add2ff9dd24b39ba2
-
Size
4.1MB
-
MD5
cc971da1793bffc9eeeb437404fd21ca
-
SHA1
2e01c37b1b06177c57757021ef76e1b9bf2d2657
-
SHA256
0c9c2baf05c8afca3dd3d461f1b7d95bff65c26d0025c83add2ff9dd24b39ba2
-
SHA512
f4ec370a75911426861d04795728ecbb530ce9ca21aced9a47b23e7942e3d2f84758ee62b09f3476c7109fe9354d919d519ca176d18cf2c230ae420a2e188a73
-
SSDEEP
98304:xF1qxgA+n3xPMxowhZMFxqtAuI+y1LO0Vgri2lGGbVYiu:xF1qxd4lxDKAUy1LZgrxBYiu
Malware Config
Signatures
Files
-
JC_0c9c2baf05c8afca3dd3d461f1b7d95bff65c26d0025c83add2ff9dd24b39ba2.exe windows:5 windows x86
774b8a279025c4fcf0ad1de4d365065d
Code Sign
55:33:a6:b0:5c:87:28:6e:60:e5:02:a2:4e:37:99:edCertificate
IssuerCN=5251371f362b4011042b13043a2d223e0f19152c2014093e313d075d110f3d082e50,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b17070e0c1c025d120116010a07+ST=0b1c1115494a5c52100110515d52141b57170d14161d12025206141340084056005707170746501e16121203571c1452160c10121450010500175112041a055b0c0b0a070bNot Before24/08/2023, 17:41Not After23/08/2024, 17:41SubjectCN=5251371f362b4011042b13043a2d223e0f19152c2014093e313d075d110f3d082e50,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b17070e0c1c025d120116010a07+ST=0b1c1115494a5c52100110515d52141b57170d14161d12025206141340084056005707170746501e16121203571c1452160c10121450010500175112041a055b0c0b0a070b34:25:79:05:19:6f:41:9c:49:8c:89:3d:c7:01:b3:e7:8b:48:1a:f0:79:10:2a:f3:06:65:33:5d:35:85:1e:4aSigner
Actual PE Digest34:25:79:05:19:6f:41:9c:49:8c:89:3d:c7:01:b3:e7:8b:48:1a:f0:79:10:2a:f3:06:65:33:5d:35:85:1e:4aDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
HeapFree
FreeEnvironmentStringsA
GetTickCount
EnumTimeFormatsW
SetFileShortNameW
LoadLibraryW
GetConsoleAliasExesLengthW
GetExitCodeProcess
GetConsoleAliasW
GetWriteWatch
GetSystemDirectoryA
lstrcatA
GetStartupInfoW
CreateJobObjectA
GetPrivateProfileIntW
GetStartupInfoA
OpenMutexW
GetHandleInformation
GetCurrentDirectoryW
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
GlobalGetAtomNameA
InterlockedExchangeAdd
DeleteVolumeMountPointA
GetFileType
MoveFileA
BuildCommDCBAndTimeoutsW
RemoveDirectoryW
FindNextChangeNotification
AddAtomA
GlobalWire
GetPrivateProfileSectionNamesA
EnumDateFormatsA
SetConsoleCursorInfo
GetModuleHandleA
FreeEnvironmentStringsW
FindNextFileW
GetStringTypeW
EnumDateFormatsW
FatalAppExitA
SetCalendarInfoA
OpenSemaphoreW
FindFirstVolumeA
GetWindowsDirectoryW
EnumSystemLocalesW
CommConfigDialogW
HeapReAlloc
GetConsoleAliasExesA
GetCommandLineW
GetVolumeNameForVolumeMountPointA
LocalAlloc
InterlockedIncrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
WideCharToMultiByte
HeapAlloc
DeleteFileA
MultiByteToWideChar
HeapSetInformation
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
user32
GetAltTabInfoW
gdi32
GetTextFaceA
SelectPalette
GetCharABCWidthsW
Sections
.text Size: 134KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 34.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ