c:\jenkins\workspace\8-2-build-windows-amd64-cygwin\jdk8u281\880\build\windows-amd64\jdk\objs\jabswitch\jabswitch.pdb
Static task
static1
Behavioral task
behavioral1
Sample
1e9412e43e650b64ec3023dd50c3ed2e8c7befca3262bf19b46ed8efaee755b6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1e9412e43e650b64ec3023dd50c3ed2e8c7befca3262bf19b46ed8efaee755b6.exe
Resource
win10v2004-20240802-en
General
-
Target
c48d450eb67ec6b7e596be13c33511aa.zip
-
Size
271KB
-
MD5
d73398bf5e95861364ccab3f8fb87c6e
-
SHA1
98b4aa0b6e466f2993fe3dde5a22ff4447588885
-
SHA256
cfb7f86c6d6817da09cb0150626e639f66b7d554dd194917075311a7b208063b
-
SHA512
0878ffc5a45748f97617edd080bbde167949832a48e30a091fdd683c8938b339708b4f965f9c68d3e4bdb928b0ba7a9a3b560d25f435ca42a76e748263c383fc
-
SSDEEP
6144:t4cGvbBF8mAMeHlRj/M8iswrL6W37cSCgAaWguyLCFp1olNtVSl:idvbBunHr4Fswf6W37cG6fyLCFp1jl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/1e9412e43e650b64ec3023dd50c3ed2e8c7befca3262bf19b46ed8efaee755b6
Files
-
c48d450eb67ec6b7e596be13c33511aa.zip.zip
Password: infected
-
1e9412e43e650b64ec3023dd50c3ed2e8c7befca3262bf19b46ed8efaee755b6.exe windows:6 windows x64 arch:x64
Password: infected
1e2f1157724358595d4ba5f4d5e8d784
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegCloseKey
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
user32
wsprintfW
kernel32
GetProcAddress
FreeLibrary
VirtualQuery
GetProcessHeap
HeapFree
HeapAlloc
GetCurrentProcessId
ProcessIdToSessionId
GetVersionExW
GetModuleFileNameW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
RaiseException
MultiByteToWideChar
WideCharToMultiByte
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetModuleHandleW
GetLastError
vcruntime140
_CxxThrowException
__std_exception_destroy
__vcrt_GetModuleFileNameW
__vcrt_LoadLibraryExW
memset
strstr
wcsstr
__C_specific_handler
__C_specific_handler_noexcept
__std_exception_copy
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
__stdio_common_vsprintf_s
_set_fmode
__p__commode
fputs
fgets
fclose
fopen_s
__acrt_iob_func
feof
api-ms-win-crt-runtime-l1-1-0
_register_onexit_function
_initialize_onexit_table
perror
terminate
_crt_atexit
_errno
exit
_register_thread_local_exe_atexit_callback
_seh_filter_exe
_set_app_type
__p___argv
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
_exit
_c_exit
__p___argc
_cexit
api-ms-win-crt-filesystem-l1-1-0
rename
remove
api-ms-win-crt-string-l1-1-0
strcat_s
strtok_s
_stricmp
strcpy_s
_wcslwr_s
wcscpy_s
wcslen
wcstok_s
wcscat_s
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
_callnewh
malloc
api-ms-win-crt-environment-l1-1-0
_dupenv_s
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 396KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ