Static task
static1
Behavioral task
behavioral1
Sample
05ba8f9003b83d1999c5c7a88cc22e40_exe32_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
05ba8f9003b83d1999c5c7a88cc22e40_exe32_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
05ba8f9003b83d1999c5c7a88cc22e40_exe32_JC.exe
-
Size
2.2MB
-
MD5
05ba8f9003b83d1999c5c7a88cc22e40
-
SHA1
d1e253354f42f9aeb7b1309b34b368c026899bd6
-
SHA256
187bb3eb66fd93854870979a3a2348f4e8ca2fc68bf179ff23d1e352f2e03802
-
SHA512
083232e447eaf168757aba651f199b36c3763e8a6a29556410c4bd63688999b79c54f4b403ced7fccb6a4a0367570f35ea5bfa53bff6fba3bde164fc9131d9a5
-
SSDEEP
49152:YgQr393VLjzU393VLjzJHHHTLzziEmlHeQd+7vE71KBAT6XIuAGtDZRUyFMzSGyw:YgQpR27s71KBA+XIuLDZPxGyUaPF8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 05ba8f9003b83d1999c5c7a88cc22e40_exe32_JC.exe
Files
-
05ba8f9003b83d1999c5c7a88cc22e40_exe32_JC.exe.exe windows:5 windows x86
8bae4544e867b7b8542d64c3da83f2a3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
ReleaseStgMedium
CreateBindCtx
CoTreatAsClass
OleDuplicateData
ReadClassStg
ReadFmtUserTypeStg
CoCreateInstance
CoInitializeEx
StringFromGUID2
CoDisconnectObject
StringFromCLSID
OleRegGetUserType
WriteClassStg
WriteFmtUserTypeStg
SetConvertStg
CoTaskMemAlloc
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
CreateStreamOnHGlobal
CoTaskMemFree
CLSIDFromString
CoInitialize
CoUninitialize
oleaut32
SafeArrayPutElement
SafeArrayPtrOfIndex
SafeArrayGetElement
SafeArrayCopy
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantCopy
SafeArrayRedim
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
LoadRegTypeLi
LoadTypeLi
RegisterTypeLi
VariantInit
VariantChangeType
SysStringByteLen
SysAllocStringByteLen
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayDestroyData
SystemTimeToVariantTime
VariantTimeToSystemTime
VarBstrFromDate
VarDateFromStr
OleLoadPicture
SysAllocStringLen
VariantClear
SysFreeString
VarBstrCmp
SysStringLen
SafeArrayDestroyDescriptor
SysReAllocStringLen
VarBstrFromCy
VarBstrFromDec
VarDecFromStr
VarCyFromStr
GetErrorInfo
SetErrorInfo
CreateErrorInfo
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
InterlockedExchange
EnumResourceLanguagesA
ConvertDefaultLocale
CreateSemaphoreA
ReleaseSemaphore
WaitForMultipleObjects
GetModuleHandleW
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetAtomNameA
GlobalFlags
GetCPInfo
GetOEMCP
LocalUnlock
LocalLock
LoadLibraryW
GetSystemDirectoryW
GetDiskFreeSpaceA
RtlUnwind
UnhandledExceptionFilter
ExitProcess
SetConsoleCtrlHandler
HeapFree
HeapAlloc
IsDebuggerPresent
RaiseException
VirtualProtect
VirtualAlloc
SetStdHandle
GetFileType
GetConsoleCP
GetConsoleMode
GetStartupInfoA
HeapReAlloc
ExitThread
CreateThread
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStringTypeA
SuspendThread
GetStdHandle
FatalAppExitA
InitializeCriticalSectionAndSpinCount
SetHandleCount
HeapCreate
HeapDestroy
VirtualFree
CreateFileW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetEnvironmentVariableA
ResumeThread
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcpynA
lstrlenA
FormatMessageA
LoadLibraryExA
DebugBreak
GetModuleFileNameA
lstrcatA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
GetCurrentProcess
GetModuleHandleA
SetThreadPriority
GetFileSizeEx
LocalFileTimeToFileTime
GetFileAttributesExA
GetShortPathNameA
GetFullPathNameA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
GetThreadLocale
GetStringTypeExA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleFileNameW
GlobalSize
GetProcessHeap
VirtualQuery
GlobalMemoryStatus
GetSystemInfo
GetLocaleInfoA
IsBadReadPtr
SetUnhandledExceptionFilter
GetTimeZoneInformation
lstrcmpiW
GetFileTime
SetFileTime
DosDateTimeToFileTime
FileTimeToDosDateTime
lstrcmpiA
GetComputerNameA
DeviceIoControl
GetTempFileNameA
GetTempPathA
GetDriveTypeA
SetCurrentDirectoryA
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
MoveFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
GetWindowsDirectoryA
GetCurrentDirectoryA
CreateDirectoryA
lstrcmpA
SystemTimeToFileTime
DeleteFileA
Sleep
WriteFile
GetTickCount
SetErrorMode
ReadFile
CompareStringW
GetSystemDirectoryA
lstrcmpW
lstrcatW
CloseHandle
OpenProcess
SetLastError
GetPrivateProfileSectionNamesA
CompareStringA
GetCurrentThread
TerminateProcess
ReadProcessMemory
GetExitCodeProcess
WriteProcessMemory
MulDiv
GetVolumeInformationA
CreateFileA
GetFileSize
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringA
InitializeCriticalSection
ResetEvent
SetEvent
OpenEventA
CreateEventA
ReleaseMutex
CreateMutexA
MapViewOfFile
UnmapViewOfFile
OpenFileMappingA
CreateFileMappingA
WritePrivateProfileStringA
ExpandEnvironmentStringsA
GetPrivateProfileIntA
FreeResource
GetPrivateProfileStringA
lstrcpyW
GetLocalTime
GetCurrentProcessId
InterlockedDecrement
InterlockedIncrement
SetFilePointer
LocalAlloc
LocalFree
GetSystemTimeAsFileTime
CompareFileTime
GetCommandLineA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetVersionExA
FindResourceA
LoadResource
LockResource
SizeofResource
CreateProcessA
WaitForSingleObject
GetStringTypeW
user32
SetParent
UnionRect
GetDCEx
ShowWindow
MoveWindow
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemInt
GetDlgItemInt
CheckRadioButton
CheckDlgButton
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenuEx
TrackPopupMenu
SetMenu
SetScrollRange
GetScrollRange
ShowScrollBar
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
SetWindowPlacement
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
GetMenu
IntersectRect
GetWindowPlacement
GetDesktopWindow
SetActiveWindow
GetNextDlgTabItem
EndPaint
BeginPaint
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetLastActivePopup
GetWindowTextLengthA
GetScrollPos
SetScrollPos
SetFocus
UnhookWindowsHookEx
GetMenuState
GetMenuStringA
InsertMenuA
RemoveMenu
GetActiveWindow
DialogBoxParamA
SetWindowTextA
EndDialog
MsgWaitForMultipleObjects
CharLowerBuffW
LockWindowUpdate
GetClipboardData
OemToCharBuffA
IsRectEmpty
PostQuitMessage
GetDC
SetRect
InvalidateRgn
CharUpperA
CharUpperBuffA
GetKeyState
EnumWindows
DrawFocusRect
DrawFrameControl
DrawStateA
DrawIconEx
SystemParametersInfoA
GetSubMenu
GetMenuItemID
GetMenuItemCount
DrawEdge
InflateRect
SetMenuDefaultItem
FillRect
OffsetRect
IsCharLowerA
MapVirtualKeyA
GetKeyNameTextA
GetKeyboardLayoutList
MapVirtualKeyExW
ToUnicodeEx
MapVirtualKeyExA
ToAsciiEx
VkKeyScanExW
GetKeyboardLayout
VkKeyScanExA
SetWindowLongA
GetDlgItemTextA
CreateDialogIndirectParamA
DestroyWindow
CreateWindowExA
KillTimer
SetTimer
CharLowerA
SetDlgItemTextA
PeekMessageA
TranslateMessage
DispatchMessageA
CharLowerBuffA
CharLowerW
GetQueueStatus
LoadAcceleratorsA
TranslateAcceleratorA
GetWindowTextA
CopyRect
GetSysColor
GetCursorPos
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
CreatePopupMenu
GetClassNameA
GetWindowLongA
SendMessageTimeoutA
SetWindowPos
ReleaseCapture
SetCursor
RegisterWindowMessageA
SetForegroundWindow
ChildWindowFromPoint
SetCapture
ClientToScreen
GetClientRect
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
WindowFromPoint
GetParent
GetWindow
PtInRect
IsWindowVisible
IsWindow
GetWindowRect
GetWindowDC
GetSystemMetrics
ReleaseDC
DestroyIcon
UnpackDDElParam
ReuseDDElParam
LoadMenuA
GetMenuBarInfo
InsertMenuItemA
BringWindowToTop
GetTabbedTextExtentA
IsClipboardFormatAvailable
DeleteMenu
SetRectEmpty
GetDialogBaseUnits
UnregisterClassA
GetSysColorBrush
ShowOwnedPopups
GetMessageA
ValidateRect
DestroyMenu
GetFocus
ScrollWindowEx
DestroyCursor
MessageBeep
GetWindowThreadProcessId
MessageBoxA
IsCharAlphaNumericA
wsprintfA
IsWindowEnabled
LoadImageA
InvalidateRect
UpdateWindow
PostMessageA
GetDlgItem
LoadBitmapA
LoadCursorA
EnableWindow
LoadIconA
SendMessageA
RedrawWindow
GetMenuItemInfoA
gdi32
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetCurrentPositionEx
ArcTo
PolyDraw
PolylineTo
PolyBezierTo
ExtSelectClipRgn
DeleteDC
CreateDIBPatternBrushPt
CreatePatternBrush
SelectPalette
PlayMetaFileRecord
GetObjectType
EnumMetaFile
SetWindowOrgEx
ExtCreatePen
CreateHatchBrush
GetDCOrgEx
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
DPtoLP
GetCharWidthA
StretchDIBits
GetBkColor
StartPage
EndPage
SetAbortProc
AbortDoc
EndDoc
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
StartDocA
GetPixel
GetWindowExtEx
GetViewportExtEx
SelectClipPath
CreateRectRgn
GetClipRgn
SelectClipRgn
SetColorAdjustment
SetArcDirection
SetMapperFlags
SetTextCharacterExtra
SetTextJustification
SetTextAlign
MoveToEx
LineTo
OffsetClipRgn
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
ModifyWorldTransform
SetWorldTransform
SetTextColor
SetStretchBltMode
SetPolyFillMode
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateDCA
CopyMetaFileA
SetGraphicsMode
GetTextMetricsA
GetNearestColor
GetDeviceCaps
GetTextExtentPoint32A
PatBlt
GetTextColor
CreateBitmap
CreateFontA
CreateDIBitmap
GetViewportOrgEx
SetViewportOrgEx
CreateSolidBrush
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontIndirectA
GetObjectA
SetROP2
CreatePen
SelectObject
GetStockObject
Rectangle
PlayMetaFile
DeleteObject
winspool.drv
DocumentPropertiesA
OpenPrinterA
GetJobA
ClosePrinter
advapi32
CopySid
RegQueryValueA
RegOpenKeyA
RegSetValueA
RegDeleteKeyA
RegEnumValueA
RegEnumKeyA
RegQueryInfoKeyA
RegDeleteValueA
RegFlushKey
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegConnectRegistryA
GetFileSecurityA
SetFileSecurityA
RegSetKeySecurity
RegOpenKeyExA
RegGetKeySecurity
SetSecurityDescriptorOwner
InitializeAcl
AddAccessAllowedAce
GetAce
RegCreateKeyExA
RegCloseKey
RegSaveKeyA
LookupAccountSidW
GetSecurityDescriptorDacl
DeleteAce
GetSecurityDescriptorOwner
LookupAccountNameA
GetSidSubAuthority
EqualSid
AllocateAndInitializeSid
GetTokenInformation
GetUserNameA
CryptExportKey
GetLengthSid
CryptDecrypt
CryptDeriveKey
CryptSetHashParam
CryptDestroyKey
CryptEnumProvidersA
CryptAcquireContextA
CryptReleaseContext
CryptGetKeyParam
CryptSetKeyParam
CryptGetProvParam
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptDestroyHash
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
IsValidSid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetFileInfoA
ExtractIconA
DragFinish
DragQueryFileA
ShellExecuteA
shlwapi
PathMatchSpecA
StrRetToStrA
PathRemoveFileSpecW
PathFindExtensionA
PathRemoveExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
UrlUnescapeA
wininet
InternetOpenA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
HttpSendRequestA
HttpEndRequestA
HttpSendRequestExA
InternetGetLastResponseInfoA
FtpOpenFileA
FtpCommandA
GopherCreateLocatorA
FtpFindFirstFileA
InternetConnectA
GopherOpenFileA
InternetOpenUrlA
HttpOpenRequestA
GopherFindFirstFileA
InternetCloseHandle
GopherGetAttributeA
InternetFindNextFileA
InternetAutodial
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetSetCookieA
InternetGetCookieA
InternetQueryDataAvailable
FtpDeleteFileA
FtpRenameFileA
FtpCreateDirectoryA
HttpQueryInfoA
HttpAddRequestHeadersA
InternetErrorDlg
FtpGetFileA
FtpPutFileA
FtpGetCurrentDirectoryA
FtpSetCurrentDirectoryA
FtpRemoveDirectoryA
comdlg32
GetFileTitleA
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 310KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 639KB - Virtual size: 638KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ