Static task
static1
Behavioral task
behavioral1
Sample
NEAS.38484b955f997cdf4c56683dbaa5dcbf21388fb9cbb861c8c193f95a3e97f5c0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.38484b955f997cdf4c56683dbaa5dcbf21388fb9cbb861c8c193f95a3e97f5c0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.38484b955f997cdf4c56683dbaa5dcbf21388fb9cbb861c8c193f95a3e97f5c0_JC.exe
-
Size
4.4MB
-
MD5
fa3009ed30c8ea10f226e4dbeb65e9fd
-
SHA1
2d90513cbbbab4f176f6b9a22dbdb90b502c5121
-
SHA256
38484b955f997cdf4c56683dbaa5dcbf21388fb9cbb861c8c193f95a3e97f5c0
-
SHA512
79d25fa2d1fda403ad59ab70c973431ac1a25108d05ae789d7b5c19837a5e5e692f98128120cdb4e9539a24cd95ccc57ff0be5031b39a45b701648eaefb63e9c
-
SSDEEP
98304:l+I6TJOINYaRkPid6ll7eJH2/ty2dMOySrRzlUE1p0uFfn:Eca8qgllFrdvrRt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.38484b955f997cdf4c56683dbaa5dcbf21388fb9cbb861c8c193f95a3e97f5c0_JC.exe
Files
-
NEAS.38484b955f997cdf4c56683dbaa5dcbf21388fb9cbb861c8c193f95a3e97f5c0_JC.exe.exe windows:4 windows x86
baa93d47220682c04d92f7797d9224ce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Sections
Size: 2.5MB - Virtual size: 21.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 410KB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kbtyfumw Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eiqhbzui Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE