Behavioral task
behavioral1
Sample
NEAS.21fcec733ea7098cf0b5c8db7920b68bf04fd46d8ca1886667957fa2e8e8e295_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.21fcec733ea7098cf0b5c8db7920b68bf04fd46d8ca1886667957fa2e8e8e295_JC.exe
-
Size
185KB
-
MD5
4ceb18b91ffb1078b2eaa26b8407b0ce
-
SHA1
67070c78929962ca386895fb15a165ca6e79b1b1
-
SHA256
21fcec733ea7098cf0b5c8db7920b68bf04fd46d8ca1886667957fa2e8e8e295
-
SHA512
86fd99fac80d72e2b462c62900e27063a2030a552a1ff4462706a2940f5b9f784a5778a10093f593d1051d181cdd958374380d32cf873dca6d0f2186287b685b
-
SSDEEP
3072:OyIpG2/iDbYNrzpJKJMqSU/OorpcHEhW11qAJVnDKsFeE5ZZlqm/kch4:vIposNrt8KHUWor+HEiEAz1FXlqm/kl
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.21fcec733ea7098cf0b5c8db7920b68bf04fd46d8ca1886667957fa2e8e8e295_JC.exe
Files
-
NEAS.21fcec733ea7098cf0b5c8db7920b68bf04fd46d8ca1886667957fa2e8e8e295_JC.exe.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 220KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ