d:\rem\csoeouywx\kohpxrcaj\jet
Static task
static1
Behavioral task
behavioral1
Sample
8e5825e4cdf2a1499f971b3f42885a8e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e5825e4cdf2a1499f971b3f42885a8e.exe
Resource
win10v2004-20231215-en
General
-
Target
8e5825e4cdf2a1499f971b3f42885a8e
-
Size
636KB
-
MD5
8e5825e4cdf2a1499f971b3f42885a8e
-
SHA1
b7d2fd64782f0df8356efa6cc59175f7e430bd74
-
SHA256
933f6f07d5c03f8dd945c8b9c0232408b1324a540545b876ef15138821ad8ba7
-
SHA512
5b42ff2e7e4e7b052180da46c536104baf0c36d3c345d58e9020e2d7892d4b031b54f36c7e1e44295d892520f9fc56581f9527733b9eaa2262f722f20569ba96
-
SSDEEP
12288:ViBEj96CF8ghCey+CPatDGumG+xmHs7avHbJt:Viyj962CWCgDGp3xvOvHbJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8e5825e4cdf2a1499f971b3f42885a8e
Files
-
8e5825e4cdf2a1499f971b3f42885a8e.exe windows:4 windows x86 arch:x86
d9df2b924766a3bf0e2df4425509b7fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
gdi32
GetTextExtentPointA
AngleArc
SetFontEnumeration
StrokeAndFillPath
CreateRoundRectRgn
CreateICW
GetGlyphOutlineW
GetPolyFillMode
ExtCreatePen
GetRgnBox
SetROP2
CloseEnhMetaFile
CreateMetaFileA
EndDoc
GetCharacterPlacementA
PlayMetaFile
comctl32
CreateUpDownControl
InitCommonControlsEx
ImageList_SetBkColor
CreatePropertySheetPage
ImageList_EndDrag
ImageList_SetOverlayImage
ImageList_SetImageCount
CreateMappedBitmap
ImageList_Create
ImageList_Duplicate
ImageList_Destroy
ImageList_SetDragCursorImage
GetEffectiveClientRect
ImageList_GetFlags
ImageList_GetBkColor
ImageList_Draw
CreateStatusWindowA
ImageList_DragEnter
DestroyPropertySheetPage
MakeDragList
ImageList_DragMove
ImageList_ReplaceIcon
ImageList_GetIcon
CreateToolbar
kernel32
ContinueDebugEvent
GetShortPathNameW
FlushInstructionCache
CompareStringA
CreateFileA
OpenSemaphoreW
ConvertDefaultLocale
HeapSize
FlushFileBuffers
GetVersionExW
ReadFile
LockFileEx
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
MoveFileExA
GetStringTypeExA
FreeEnvironmentStringsW
CreateMutexA
InterlockedDecrement
GetCPInfo
OutputDebugStringW
MultiByteToWideChar
SetCriticalSectionSpinCount
IsValidCodePage
GetLocaleInfoW
GetModuleHandleA
CreateMailslotW
SetLastError
RtlUnwind
WriteProfileStringA
SetConsoleCursorPosition
LCMapStringA
GetOEMCP
GlobalLock
GetCurrentThread
EnumSystemLocalesA
SetConsoleCursorInfo
GetFileAttributesA
GetTickCount
HeapFree
GetThreadTimes
GetCurrentProcessId
SetStdHandle
SleepEx
TerminateProcess
GetTimeFormatA
GetStdHandle
CreatePipe
GetLogicalDriveStringsW
LeaveCriticalSection
RtlMoveMemory
GetNamedPipeHandleStateW
DeleteFileA
GetEnvironmentVariableW
LoadLibraryA
TlsGetValue
GetDateFormatA
GetEnvironmentStringsW
GetExitCodeProcess
HeapAlloc
GetConsoleCursorInfo
WideCharToMultiByte
DeleteFiber
DeleteCriticalSection
GetCurrentThreadId
OpenMutexA
ReadConsoleInputW
CreateProcessA
FindResourceExA
GetConsoleMode
GetTimeZoneInformation
GetStartupInfoA
GetProcessHeaps
CreateSemaphoreA
SetEnvironmentVariableA
GetDriveTypeA
FreeResource
lstrcatW
GetACP
EnumSystemCodePagesA
OpenFileMappingW
FreeEnvironmentStringsA
VirtualAlloc
IsBadWritePtr
LCMapStringW
GetFileAttributesW
SetFilePointer
GetFileSize
HeapDestroy
GetWindowsDirectoryA
IsDebuggerPresent
CompareStringW
SetConsoleActiveScreenBuffer
VirtualProtect
EnumResourceNamesW
HeapReAlloc
QueryPerformanceCounter
EnumDateFormatsExA
GetEnvironmentStrings
GetFullPathNameW
lstrcmpiA
CreateThread
GetStringTypeA
GetProcAddress
VirtualQuery
GetDiskFreeSpaceExA
GetThreadSelectorEntry
WritePrivateProfileStringA
RtlFillMemory
GetFileType
GetCommandLineA
GetNumberFormatA
VirtualQueryEx
IsValidLocale
UnhandledExceptionFilter
GetUserDefaultLCID
InitializeCriticalSection
GetStringTypeW
WriteFile
GetCurrentProcess
GetLocaleInfoA
TlsFree
SetHandleCount
CreateDirectoryA
GetLastError
CloseHandle
HeapCreate
GetVersionExA
GetPrivateProfileStructW
GetModuleFileNameA
GetSystemInfo
ResetEvent
WriteConsoleOutputCharacterW
GetStringTypeExW
ReadConsoleOutputW
VirtualFree
TlsAlloc
EnumCalendarInfoW
InterlockedExchange
FoldStringW
GetLogicalDriveStringsA
CreateFileMappingW
TlsSetValue
GetSystemDefaultLCID
GetSystemTimeAsFileTime
ExitProcess
GlobalGetAtomNameW
WritePrivateProfileStructA
GetMailslotInfo
WaitForSingleObjectEx
user32
DefWindowProcW
LoadCursorA
RegisterClassA
ShowWindow
ClientToScreen
DestroyWindow
DdeReconnect
CreateWindowExW
DrawIconEx
CloseWindowStation
GetCursor
RegisterClassExA
GetDlgItem
MenuItemFromPoint
InSendMessageEx
CharLowerW
DdeAccessData
GetDialogBaseUnits
SetCursor
GetClipboardSequenceNumber
LoadImageA
OemToCharA
IsDialogMessage
LoadBitmapA
DrawTextExW
CheckMenuRadioItem
EqualRect
ShowScrollBar
GetClassInfoA
SetForegroundWindow
AnyPopup
MessageBoxA
SetThreadDesktop
SetScrollPos
GetClipCursor
GetGUIThreadInfo
GetMenuContextHelpId
TabbedTextOutW
IsCharAlphaW
RegisterHotKey
DdeQueryStringA
GetKBCodePage
RegisterWindowMessageA
CreateDialogIndirectParamA
Sections
.text Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ