Behavioral task
behavioral1
Sample
NEAS.da173f071d891c7d9db83bfafc0475dc82b0f6978a482ebbd040faf649cfa512_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.da173f071d891c7d9db83bfafc0475dc82b0f6978a482ebbd040faf649cfa512_JC.exe
-
Size
3.1MB
-
MD5
bde195e7820bd7e27ebbd59a8699714f
-
SHA1
8e08c9e2652501c2c4c0ef81b9207ad0ee7171a9
-
SHA256
da173f071d891c7d9db83bfafc0475dc82b0f6978a482ebbd040faf649cfa512
-
SHA512
92f7d87ee58ecb2f9558f78780dee08d919d1f885a7143432ce00a099836ba8d6386dd03333184ddc1b67a347098300fd6d01d388ea5c06a3c501e86e7e21a3f
-
SSDEEP
49152:KG8w8u+DelRlRs5xGJEg0+R6kGgbGUqKNoEpG7JDPFdM/78HsKU7KfeenmjWBirs:idZ69sURcUqKODlo/7z1emjTrs
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.da173f071d891c7d9db83bfafc0475dc82b0f6978a482ebbd040faf649cfa512_JC.exe
Files
-
NEAS.da173f071d891c7d9db83bfafc0475dc82b0f6978a482ebbd040faf649cfa512_JC.exe.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 13KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 42KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ