Static task
static1
Behavioral task
behavioral1
Sample
joy malware.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
joy malware.exe
Resource
win10v2004-20240508-en
General
-
Target
joy malware.exe
-
Size
80KB
-
MD5
2f1959f6aa175a7b0279f6346aa991c7
-
SHA1
e23ab5c5e19988ba5214ca4cdf0dbad869d087e2
-
SHA256
b83930eaba7b886dc44bd22e1c34617aaf9ee40259680e6edd37d9c4d9cae7ea
-
SHA512
52b4113596cf241d650d7d6146929778eddc5c9214d171e2b3ec36fc77bd739ed0d00ca905114fe263d630fd547a4041c5aa1fd533c00c3535647507b4f066c5
-
SSDEEP
1536:o2Y0VNblnigen1FQGpaika1PASjg/oeRd:o23rbZi/8GprF3jg/oId
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource joy malware.exe
Files
-
joy malware.exe.exe windows:4 windows x86 arch:x86
c29ab370ed500debe05d495f2d8c12c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
GetModuleFileNameA
GetStdHandle
SetConsoleMode
GetConsoleMode
Sleep
SetConsoleTextAttribute
GetTickCount
SetConsoleCursorInfo
SetConsoleCursorPosition
GetVolumeInformationA
ReadConsoleInputA
WriteConsoleA
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
CompareStringW
ExitProcess
TerminateProcess
GetCurrentProcess
GetCommandLineA
GetVersion
SetHandleCount
GetFileType
GetStartupInfoA
GetLastError
ReadFile
SetFilePointer
HeapFree
CloseHandle
GetFileAttributesA
GetProcAddress
GetModuleHandleA
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
HeapAlloc
SetStdHandle
FlushFileBuffers
VirtualAlloc
HeapReAlloc
CreateFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
SetEndOfFile
CompareStringA
user32
FindWindowA
GetDesktopWindow
GetWindowRect
SetWindowPos
winmm
timeGetTime
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ