c:\Users\Administrator\Documents\BSOD\BSOD\obj\Debug\BSOD.pdb
Static task
static1
Behavioral task
behavioral1
Sample
jackhook.exe
Resource
win10v2004-20231215-en
General
-
Target
jackhook.exe
-
Size
103KB
-
MD5
a725535e06400e7d8a61cb91fa6564f7
-
SHA1
9b2d4a3752cdb9d594648d04368aca236f0a0b2f
-
SHA256
2c79d8084bebbd4636573188523cdf94f2cad510286504984f4605d53eac9b57
-
SHA512
6520d6756aae43bafce7b3616846b66cd3961d6f66c984bdef12c83a21298a202ef21f779f6f2fc34645bf755b3cdc18357695d6846f46bbf00abe20a4e12d99
-
SSDEEP
3072:vA56zjINwGG7y2I0FC2/N3wCycp1UDGNMKNg:YijCsUgCYN3wFqbSKN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource jackhook.exe
Files
-
jackhook.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ