C:\re\jdk7u45\229\build\windows-amd64\tmp\jp2launcher\obj64\jp2launcher.pdb
Static task
static1
Behavioral task
behavioral1
Sample
97daed927b9c93fa9c7b640ea697013d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97daed927b9c93fa9c7b640ea697013d.exe
Resource
win10v2004-20231222-en
General
-
Target
97daed927b9c93fa9c7b640ea697013d
-
Size
1.9MB
-
MD5
97daed927b9c93fa9c7b640ea697013d
-
SHA1
5d7b69cbe607f83ce2a619bc93798cba48a15ff5
-
SHA256
f1c9aec7f5052acdce28a5ff11897afac41e0947bb6203b7c0b53e1fd588dbe2
-
SHA512
fc97d4d5e6f0d708118aa2e818dcb7f2f37e435f375a58908dab82cda00ca9ed308097bc26086bca3b00bd0660fe61b25bd50b298bfcb1063dd5c405d3a5f4f0
-
SSDEEP
24576:egN28OfLqLuR2ROf1IegqutJQ5FeQzcuC4r6HQ:egjOfLj2RAR5FeA6w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97daed927b9c93fa9c7b640ea697013d
Files
-
97daed927b9c93fa9c7b640ea697013d.exe windows:5 windows x64 arch:x64
1bd67dd8504dbae818abb397bad318ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
msvcr100
fgets
fopen
?terminate@@YAXXZ
__C_specific_handler
_amsg_exit
__getmainargs
_XcptFilter
_exit
_ismbblead
_cexit
exit
_acmdln
strtok
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
__crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QEAAXXZ
_unlock
__dllonexit
_lock
_onexit
fseek
fclose
strstr
getenv
memcpy
_vsnprintf_s
_ftime64_s
strftime
_snprintf_s
_localtime64
_wstat64i32
strcat_s
memcpy_s
_splitpath_s
strcpy_s
atoi
sprintf_s
??_V@YAXPEAX@Z
sscanf
__argv
__argc
_putenv
sprintf
__CxxFrameHandler3
memmove
??0exception@std@@QEAA@AEBV01@@Z
_CxxThrowException
??2@YAPEAX_K@Z
free
printf
_stat64i32
_snprintf
??_U@YAPEAX_K@Z
_time64
??3@YAXPEAX@Z
??1exception@std@@UEAA@XZ
?what@exception@std@@UEBAPEBDXZ
??0exception@std@@QEAA@AEBQEBD@Z
_mbslwr
_mbsstr
_mbsrchr
_mbsnbcpy
_mbsnbcpy_s
_mbschr
strrchr
memset
calloc
_strdup
_mbsnbcmp
_mbsicmp
_initterm
_mbscmp
malloc
kernel32
MultiByteToWideChar
FreeLibrary
RaiseException
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
DecodePointer
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
EncodePointer
GetStartupInfoW
Sleep
lstrcpynA
WideCharToMultiByte
lstrcmpiA
GetSystemWindowsDirectoryA
GetFileAttributesA
GetCurrentThreadId
GetCurrentProcessId
OutputDebugStringA
GetShortPathNameA
GetLongPathNameA
FormatMessageA
LocalAlloc
lstrlenA
CreateProcessA
GetSystemDirectoryA
LoadLibraryA
CreateFileA
CloseHandle
GetNativeSystemInfo
GetCurrentProcess
GetVersionExA
GlobalMemoryStatusEx
GetModuleHandleA
GetProcAddress
WaitForSingleObject
lstrcpyA
GetWindowsDirectoryA
FindFirstFileA
GetModuleFileNameA
FindClose
GetEnvironmentVariableA
GetLastError
LocalFree
user32
wsprintfA
ole32
StringFromCLSID
CoTaskMemFree
oleaut32
SysAllocString
SysStringLen
SysAllocStringByteLen
SysFreeString
VariantClear
Sections
.text Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 606B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ