c:\jenkins\workspace\8-2-build-windows-x64-cygwin-sans-NAS\jdk8u421\1068\build\windows-x64\deploy\jre-image\bin\javaws.pdb
Static task
static1
Behavioral task
behavioral1
Sample
e21bd757efb1e686017d44b9750eaec78266044ddea75048d7e6138de86180ec.exe
Resource
win7-20240903-en
General
-
Target
e21bd757efb1e686017d44b9750eaec78266044ddea75048d7e6138de86180ec
-
Size
1.9MB
-
MD5
7e8c159065361134c31633752ea57e7f
-
SHA1
c2de4f3ebd42858af24000a7c18e56cb78298819
-
SHA256
e21bd757efb1e686017d44b9750eaec78266044ddea75048d7e6138de86180ec
-
SHA512
a7d75635bebe4cbdf96c03519d3637ddbe2f19696a1c4aadadc176b761e77c041bf3b7ecd4e7587e90e6688905abf63050f46777125f3ee62a7513f838c36d9b
-
SSDEEP
24576:1Zio+rga2kuRW2S1bFkCnGt/sBlDqgZQd6XKtiMJYiPU:1Mo+rz2Q2S1RJM/snji6attJM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e21bd757efb1e686017d44b9750eaec78266044ddea75048d7e6138de86180ec
Files
-
e21bd757efb1e686017d44b9750eaec78266044ddea75048d7e6138de86180ec.exe windows:6 windows x64 arch:x64
87fbc8a3b0f025fd90979fb325bbb38a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
GetCurrentProcessId
WideCharToMultiByte
FreeLibrary
GetModuleHandleW
GetProcAddress
LoadLibraryW
CreateDirectoryW
FindClose
FindFirstFileW
CloseHandle
WaitForSingleObject
CreateEventW
OpenProcess
GetTickCount
GetSystemWindowsDirectoryW
GetModuleFileNameW
GetThreadLocale
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
VerSetConditionMask
GetEnvironmentVariableW
CreateFileW
GetLongPathNameW
GetShortPathNameW
GetTempPathW
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetCurrentProcess
CreateProcessW
GlobalMemoryStatusEx
GetLocalTime
GetSystemDirectoryW
GetWindowsDirectoryW
GetVersionExW
GetNativeSystemInfo
GlobalAlloc
GlobalFree
LocalAlloc
LocalFree
FormatMessageW
lstrlenW
VerifyVersionInfoW
WTSGetActiveConsoleSessionId
OutputDebugStringW
GetCurrentThreadId
GetExitCodeProcess
GetModuleHandleExW
GetFileAttributesW
WriteConsoleW
HeapSize
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
GetFileSizeEx
GetFileAttributesExW
SetFilePointerEx
ReadConsoleW
ReadFile
SetEndOfFile
HeapReAlloc
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetStdHandle
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetFullPathNameW
GetCurrentDirectoryW
SetEnvironmentVariableW
HeapAlloc
HeapFree
RaiseException
GetSystemInfo
VirtualProtect
VirtualQuery
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
RtlPcToFileHeader
RtlUnwindEx
RtlUnwind
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetCommandLineA
GetCommandLineW
DeleteFileW
GetTimeZoneInformation
GetStdHandle
WriteFile
GetStringTypeW
user32
TranslateMessage
DispatchMessageW
DefWindowProcW
GetMessageW
MessageBoxW
RegisterClassW
CreateWindowExW
SetTimer
LoadCursorW
wsprintfW
OpenInputDesktop
CloseDesktop
GetWindowThreadProcessId
GetShellWindow
ole32
StringFromCLSID
CoTaskMemFree
oleaut32
VariantClear
SysAllocString
SysFreeString
SysStringLen
SysAllocStringByteLen
wsock32
WSAAsyncSelect
closesocket
socket
send
ntohs
listen
ioctlsocket
accept
recv
bind
connect
getsockname
WSAStartup
WSAGetLastError
htons
Sections
.text Size: 282KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE