Resubmissions
12/04/2024, 14:32
240412-rv9pbabb85 1012/04/2024, 14:31
240412-rvxdzseb9w 1012/04/2024, 14:30
240412-rvkp7abb72 1012/04/2024, 14:30
240412-rvffgabb69 1012/04/2024, 14:30
240412-rve5pseb8y 709/04/2024, 07:35
240409-je21jahf78 809/04/2024, 07:35
240409-je2d1ahf76 1009/04/2024, 07:35
240409-je2d1ach91 709/04/2024, 07:35
240409-jev7zshf73 814/10/2023, 04:04
231014-enc1jshf56 8Static task
static1
Behavioral task
behavioral1
Sample
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
Resource
win11-20240319-en
General
-
Target
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
-
Size
1.9MB
-
MD5
3bf670e5e1c152674b1a6f0fd3ed67f1
-
SHA1
11c6df477c1d8b95d7c6313f05cd759df34cdc4e
-
SHA256
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d
-
SHA512
3cae3752e25a268842a91e87d7dc721f9aee7059e06bcd3e7d6aa90ec6d1b2fe59cad62963f452bbe850af31a2710dd429bad436e10756857ec90fa21bdbb968
-
SSDEEP
49152:/jdg0nPwhegnBrxZPlH/+ui3T4Ga0e0MTDD4yfYyHs8Xu3/:720nPcnZxZPZgeccD4yfnn+/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
Files
-
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe.exe windows:5 windows x86 arch:x86
9510dea81cc5ce11a4de430720afcd42
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumaProcessorNode
GetDriveTypeW
EnumCalendarInfoW
MoveFileExW
InterlockedDecrement
GetEnvironmentStringsW
SetHandleInformation
GetProfileStringW
SetVolumeMountPointW
GetComputerNameW
OpenSemaphoreA
BackupSeek
FreeEnvironmentStringsA
GetModuleHandleW
GenerateConsoleCtrlEvent
GetConsoleAliasesLengthA
GetConsoleAliasExesW
EnumTimeFormatsA
TzSpecificLocalTimeToSystemTime
GetConsoleCP
GlobalAlloc
LoadLibraryW
FatalAppExitW
GetCalendarInfoW
EnumSystemCodePagesA
TerminateProcess
GetStartupInfoW
RaiseException
CreateJobObjectA
GetPrivateProfileIntW
InterlockedExchange
FindFirstFileW
GetCurrentDirectoryW
PeekConsoleInputW
MoveFileW
OpenMutexA
GetProcessId
LocalAlloc
BuildCommDCBAndTimeoutsW
GetNumberFormatW
AddAtomW
RemoveDirectoryW
GlobalGetAtomNameW
FindNextFileA
EnumDateFormatsA
GlobalUnWire
GetModuleHandleA
SetLocaleInfoW
EnumResourceNamesA
CreateMailslotA
GetStringTypeW
VirtualProtect
EnumDateFormatsW
GetShortPathNameW
FindAtomW
FindFirstVolumeW
DeleteFileW
AddConsoleAliasA
CreateFileW
ReadFile
FlushFileBuffers
SetDefaultCommConfigA
GetVolumeNameForVolumeMountPointA
GetFileSize
GetCommandLineW
GetLastError
WriteConsoleW
SetStdHandle
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
GetProcAddress
ExitProcess
DeleteFileA
HeapSetInformation
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
FreeEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
SetFilePointer
WideCharToMultiByte
GetConsoleMode
HeapReAlloc
LCMapStringW
CloseHandle
user32
CharUpperW
LoadMenuA
gdi32
GetTextFaceW
SelectPalette
advapi32
LookupAccountSidW
shell32
DragFinish
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1.7MB - Virtual size: 32.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ