Static task
static1
Behavioral task
behavioral1
Sample
2d49b15c5bca65111fd6c45e56eb92d0_exe32_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2d49b15c5bca65111fd6c45e56eb92d0_exe32_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2d49b15c5bca65111fd6c45e56eb92d0_exe32_JC.exe
-
Size
329KB
-
MD5
2d49b15c5bca65111fd6c45e56eb92d0
-
SHA1
38ce1da809552ffd1d4557c1b85e66944690716d
-
SHA256
30cdb77e8ec407b839feecd91d628083c6f6512f5e9ed45e9ba6a913ccf2cfa7
-
SHA512
afb0d5f39f17ab1a851699cc9bb2ca22950e219d65102173bc59fe1b6e29e68a6b86d93a0cc37a1c1b1a97585f72e64ef89d22c067537e19cc1bd1eb92d82866
-
SSDEEP
6144:dFZOSgIhBBQERJpJBQHEJVLiRz96fUjt7vVOGhDRfFYnOOkw5:Lo4vQ4JWHLz96uvV5bqnOOf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d49b15c5bca65111fd6c45e56eb92d0_exe32_JC.exe
Files
-
2d49b15c5bca65111fd6c45e56eb92d0_exe32_JC.exe.exe windows:1 windows x86
04abc6c8fed72932301f16b8ca3d23a0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
RtlUnwind
DuplicateHandle
GetModuleHandleA
CloseHandle
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetLastError
CreateFileA
CreateEventA
WaitForSingleObject
SetLastError
lstrcpyA
lstrcmpA
lstrcatA
lstrcmpiA
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
crtdll
__GetMainArgs
exit
raise
signal
advapi32
RegOpenKeyExA
RegQueryValueExA
framedyn
?Left@CHString@@QBE?AV1@H@Z
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 7KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ