Static task
static1
Behavioral task
behavioral1
Sample
1cacaa963d1a03c085d23d3cdd095ce0_exe32_JC.exe
Resource
win7-20230831-en
General
-
Target
1cacaa963d1a03c085d23d3cdd095ce0_exe32_JC.exe
-
Size
90KB
-
MD5
1cacaa963d1a03c085d23d3cdd095ce0
-
SHA1
14a3b7b294c2cae1c1a63f855dd47a600cfe6ec5
-
SHA256
f8371917c2d0806b89775d8fb547622e31aa58035a3facfee1752e070fd60176
-
SHA512
2e3992e09104014de18cd163ea52b1c9a00454dffd1114eaff29e24761cc422c959dc8dcd0e7b82fad703719db1b4bed3217a1bc7e7dd7468b5b0123bd28e964
-
SSDEEP
1536:JK87//VNEQWZlIkHfHFF0tgluQ5AsqySMwlDZS2UGRDHES/MwfDUhy:c87//0zHfHL0SOaxYMDiYS/MwfD4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1cacaa963d1a03c085d23d3cdd095ce0_exe32_JC.exe
Files
-
1cacaa963d1a03c085d23d3cdd095ce0_exe32_JC.exe.exe windows:4 windows x86
5b3c64288b64fa8affabc847c78f9923
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
comctl32
InitCommonControls
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
DeleteDC
DeleteObject
GetDIBits
GetStockObject
GetTextMetricsA
SelectObject
SetBkColor
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateMutexA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindAtomA
GetAtomNameA
GetCurrentProcess
GetCurrentProcessId
GetLastError
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetSystemInfo
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
QueryPerformanceFrequency
ReadProcessMemory
SetPriorityClass
SetUnhandledExceptionFilter
Sleep
VirtualProtect
VirtualQuery
VirtualQueryEx
WideCharToMultiByte
WritePrivateProfileStringA
WriteProcessMemory
msvcrt
_strdup
_stricmp
_strlwr
_strnicmp
__getmainargs
__lc_codepage
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_errno
_iob
_isctype
_mkdir
_onexit
_pctype
_setjmp
_setmode
_snprintf
abort
atexit
fclose
fflush
fgets
fopen
fputc
fputs
free
fwrite
getenv
localeconv
longjmp
malloc
memchr
memcpy
memmove
memset
realloc
signal
sscanf
strchr
strcmp
strlen
strncmp
strstr
vfprintf
vsprintf
wcslen
shell32
SHGetFolderPathA
user32
ClientToScreen
ClipCursor
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
EnableWindow
EnumChildWindows
EnumWindows
GetClassNameA
GetClientRect
GetDC
GetDesktopWindow
GetDlgCtrlID
GetParent
GetSystemMetrics
GetWindowTextA
GetWindowThreadProcessId
InvalidateRect
IsIconic
IsWindowEnabled
LoadCursorA
LoadIconA
MapWindowPoints
MessageBoxA
PeekMessageA
PostQuitMessage
RegisterClassA
ReleaseDC
SendMessageA
SetForegroundWindow
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TranslateMessage
UpdateWindow
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 3KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE