C:\jdk7_32P\jdk7\build\windows-i586\tmp\deploy\jqs\jqs\jqs.pdb
Static task
static1
Behavioral task
behavioral1
Sample
30dcd5241ae38d2239636378030d8000N.exe
Resource
win7-20240704-en
General
-
Target
30dcd5241ae38d2239636378030d8000N.exe
-
Size
385KB
-
MD5
30dcd5241ae38d2239636378030d8000
-
SHA1
1f4d11b39a8cce6e2fb0416637b137ede1b5c4c5
-
SHA256
78c27546841cb63aee9c7a8d811bb67b2ce40cdf63bc8524eb5a806b1ff07075
-
SHA512
9c5d7d1410b064ea35e00889af65dd9f3c7ccbeabca9a128c398575aad28b716f3e629dcb29e3cbc46fd4f4bc894872fcd162b611ee145ae8569107d1613fb0b
-
SSDEEP
6144:QexJn7DetQPIEBM+Xj0ONNUOvb82kx2xfr9GJn5gPTZo8inoDnPeTfgKZ7JP2BnN:QeznfUQPl2S0OD42ZxfjozUOBJP2JhY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 30dcd5241ae38d2239636378030d8000N.exe
Files
-
30dcd5241ae38d2239636378030d8000N.exe.exe windows:5 windows x86 arch:x86
ab51c5ed4e68020a4aac68f885f4b988
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
recv
send
accept
htonl
htons
WSAEventSelect
select
getsockname
connect
listen
bind
socket
WSASetEvent
WSAWaitForMultipleEvents
WSAResetEvent
WSACreateEvent
WSAGetLastError
closesocket
WSACloseEvent
WSACleanup
WSAStartup
msvcr100
getenv
__iob_func
_localtime64
_time64
_vsnprintf
setlocale
strftime
fflush
_endthreadex
_beginthreadex
feof
fgets
tolower
_unlock
__dllonexit
isspace
_onexit
_except_handler4_common
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
__initenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
_controlfp_s
strtod
strtoul
isdigit
_purecall
_strnicmp
exit
_snprintf
fread
ferror
iswspace
isxdigit
sscanf
sprintf_s
memmove_s
strcspn
fclose
strtol
printf
_stat64i32
fopen
_errno
strerror
??0bad_cast@std@@QAE@ABV01@@Z
??1bad_cast@std@@UAE@XZ
??0bad_cast@std@@QAE@PBD@Z
??_U@YAPAXI@Z
localeconv
memset
ldexp
??_V@YAXPAX@Z
free
fprintf
memchr
memcpy
__CxxFrameHandler3
memmove
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
??2@YAPAXI@Z
??3@YAXPAX@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
__crtLCMapStringA
__pctype_func
isupper
___lc_codepage_func
___lc_handle_func
_calloc_crt
malloc
islower
__uncaught_exception
_free_locale
abort
_lock
kernel32
RaiseException
LocalAlloc
GetCurrentThreadId
GetTickCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
QueryPerformanceFrequency
QueryPerformanceCounter
GetSystemTimeAsFileTime
Sleep
CreateFileMappingA
InterlockedDecrement
MapViewOfFile
LoadLibraryExA
VirtualLock
FindFirstFileA
FindNextFileA
FindClose
DeviceIoControl
SetFilePointer
ReadFile
VirtualUnlock
UnmapViewOfFile
WaitForMultipleObjects
GlobalMemoryStatus
SetConsoleCtrlHandler
GetCurrentProcessId
OpenProcess
SetPriorityClass
CreateEventA
SetEvent
WaitForSingleObject
GetLogicalDrives
QueryDosDeviceA
GetThreadLocale
GetCurrentThread
WideCharToMultiByte
CreateFileA
GetFullPathNameA
GetLongPathNameA
GetModuleFileNameA
CloseHandle
SetErrorMode
GetVersionExA
GetSystemInfo
GetLastError
GetCurrentProcess
GetProcAddress
FreeLibrary
GetSystemDirectoryA
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedIncrement
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 242KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ