Static task
static1
Behavioral task
behavioral1
Sample
jgpd.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
jgpd.exe
Resource
win10v2004-20231023-en
General
-
Target
jgpd.exe
-
Size
1.0MB
-
MD5
a77df0c34b57c7c43b934a0b7c9a5abb
-
SHA1
1202c4461ee3e8ff052485048390512ff3b5ec6b
-
SHA256
c23f5e6b3f5b72510e76b7f30cf7d16f2f8858708e4c099abdfed8a127096d91
-
SHA512
f0a727c23c2c7974929639f6ad4e09341c4c66b18b2501ab4ce8c2cfec2edcbf2cde755410d8824cf7e9027402f603e38f3b2b1468456de6356f19758277682a
-
SSDEEP
24576:PiYwbNQURNL5GHcmFT/RoO3DuIOPjMVAm1gKp6ck/OZuX7xL12c:PiY+5G8WKO3DFijMVnVc9+6/2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource jgpd.exe
Files
-
jgpd.exe.exe windows:4 windows x86
84025a7cc85cbe0d6b51a6f43d22ee43
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
kernel32
AddAtomA
CloseHandle
CreateFileA
CreateMutexA
CreateProcessA
DeleteFileA
ExitProcess
FindAtomA
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
GetAtomNameA
GetCommandLineA
GetComputerNameA
GetCurrentDirectoryA
GetEnvironmentVariableA
GetFileAttributesA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStdHandle
GetTempPathA
InterlockedIncrement
LoadLibraryA
LoadResource
ReadFile
ReleaseMutex
SetCurrentDirectoryA
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteFile
msvcrt
_fdopen
_fileno
_isatty
_strdup
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_ctype
_errno
_fileno
_iob
_isctype
_onexit
_pctype
_setmode
_vsnprintf
abort
atexit
atoi
exit
fclose
fflush
fopen
fprintf
fread
free
fseek
ftell
fwrite
getc
getenv
localeconv
malloc
memchr
memcpy
memmove
memset
printf
realloc
setlocale
setvbuf
signal
sprintf
strcat
strchr
strcmp
strcoll
strcpy
strftime
strlen
strncpy
strtod
strtol
strtoul
strxfrm
ungetc
shell32
ShellExecuteA
user32
BeginPaint
CreateWindowExA
DefWindowProcA
DrawTextA
EndPaint
GetClientRect
LoadCursorA
LoadIconA
MessageBoxA
PostQuitMessage
RegisterClassExA
Sections
.text Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 18KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 694KB - Virtual size: 696KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE