Static task
static1
Behavioral task
behavioral1
Sample
CjhdEi5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CjhdEi5.exe
Resource
win10v2004-20231222-en
General
-
Target
CjhdEi5.exe
-
Size
294KB
-
MD5
c818373fc136ada0cfd16b4502530811
-
SHA1
b5e2386d2504173c5e96ee2c978c5dfba1d9476e
-
SHA256
57fc37bfab5489b2ace66257d03b23a098ddc80d25b22540e0e5745becc4dbad
-
SHA512
c651dea67194378f4f986f82fc338e11db4680700894715d66a1603d3e659c192e35af59e273da13d5bd0e868ad701585f28fcba8163c9d61be77d42647fedb9
-
SSDEEP
6144:rD2yK16szHrvUAz4O8x3qMMdyZaPohzXJTOq:rRszHo4BzdyZaPodQq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource CjhdEi5.exe
Files
-
CjhdEi5.exe.exe windows:6 windows x64 arch:x64
aa968cff2e5564bcb4c431da4a7ac8af
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
FindFirstFileExW
FindClose
HeapReAlloc
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetFileSizeEx
GetConsoleOutputCP
FlushFileBuffers
ReadConsoleW
GetConsoleMode
SetFilePointerEx
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetStdHandle
CreateFileW
HeapSize
WriteConsoleW
Process32Next
CreateToolhelp32Snapshot
Process32First
GetModuleFileNameA
GetCurrentProcess
WideCharToMultiByte
GlobalFree
GlobalAlloc
MultiByteToWideChar
QueryPerformanceCounter
FreeLibrary
GetProcAddress
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
CloseHandle
GetLastError
GetCommandLineW
GetCommandLineA
WriteFile
GetStdHandle
TerminateProcess
Sleep
OpenProcess
FindNextFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LocalFree
LCMapStringEx
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
CreateEventW
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ReadFile
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
RtlUnwind
advapi32
ConvertSidToStringSidW
ControlService
OpenServiceA
ChangeServiceConfigA
OpenSCManagerA
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueA
CreateProcessWithTokenW
ImpersonateLoggedOnUser
OpenProcessToken
SetThreadToken
StartServiceW
DuplicateTokenEx
QueryServiceStatusEx
GetTokenInformation
RegCreateKeyExW
RegSetValueExW
StartServiceA
ole32
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ