C:\re\jdk7u45\229\build\windows-amd64\tmp\jabswitch\jabswitch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
075fa426f62c3370ca7098a414061470N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
075fa426f62c3370ca7098a414061470N.exe
Resource
win10v2004-20240802-en
General
-
Target
075fa426f62c3370ca7098a414061470N.exe
-
Size
2.9MB
-
MD5
075fa426f62c3370ca7098a414061470
-
SHA1
2c123fc58a92bdfd8802a53c432c23325c0698f5
-
SHA256
a6068259dca53b35b0177442e31033b91bfc9264fd63f64af6ac4c5d15ae5029
-
SHA512
626531d1ff1befe5b371fc9eaa7ebd2324b53227f23c20e1f13cb8fdf8588dd2a44172e75eaabdd7993eeaf17a78ac7e6ad1e4aefca9d935062efef921d0e4cf
-
SSDEEP
24576:mHUH8blHfHUH8b4N4TSI8LUlFl5FpPCqnstLyUktHIiLy6c+lPYKSI8LUlFl5Fp+:OUm/UycY/KqnstLet3Ly65cY/+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 075fa426f62c3370ca7098a414061470N.exe
Files
-
075fa426f62c3370ca7098a414061470N.exe.exe windows:5 windows x64 arch:x64
4b28658f0faec3fceb2d96685cc1842a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
user32
wsprintfW
msvcr100
strcpy_s
vsprintf_s
_CRT_RTC_INITW
_amsg_exit
__getmainargs
__C_specific_handler
_XcptFilter
_exit
_cexit
exit
strcat_s
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
wcscpy_s
wcstok_s
wcscat_s
wcsstr
_wcslwr_s
wcslen
??2@YAPEAX_K@Z
_dupenv_s
printf
perror
free
fopen_s
fprintf
fclose
remove
_errno
rename
strstr
feof
fgets
_stricmp
fputs
strtok_s
memset
__initenv
kernel32
VirtualQuery
GetProcessHeap
HeapAlloc
HeapFree
FreeLibrary
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
LoadLibraryW
GetProcAddress
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
EncodePointer
Sleep
GetCurrentProcessId
ProcessIdToSessionId
GetModuleFileNameW
GetVersionExW
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 972B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 410B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ