Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f69b03d882a0bdf592abb37420a9bf35e2db8239f7c6b036b2c967a51eecc9b7_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.f69b03d882a0bdf592abb37420a9bf35e2db8239f7c6b036b2c967a51eecc9b7_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.f69b03d882a0bdf592abb37420a9bf35e2db8239f7c6b036b2c967a51eecc9b7_JC.exe
-
Size
5.0MB
-
MD5
170da096cc6252c6e00ad3debe9f8c8a
-
SHA1
41e67bd5d0b388d891c00316eeaeac9041dbb462
-
SHA256
f69b03d882a0bdf592abb37420a9bf35e2db8239f7c6b036b2c967a51eecc9b7
-
SHA512
cc5b644b359546bb795fd881b03f5826705cbe10579cd925003c9d0fce4e458cd700230c1d4b1f00135c968b750fd243130fc08084fee201df39cb9d35e5d14b
-
SSDEEP
98304:IW9wFixDuU8wo6HMjldL54BG1HY8oiX/oYOfCNhNGOBNiU6wGWKxh:/AUDuUm6snzHnLBfah
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.f69b03d882a0bdf592abb37420a9bf35e2db8239f7c6b036b2c967a51eecc9b7_JC.exe
Files
-
NEAS.f69b03d882a0bdf592abb37420a9bf35e2db8239f7c6b036b2c967a51eecc9b7_JC.exe.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 288KB - Virtual size: 536KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 40KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 24KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 20KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CaiHong Size: - Virtual size: 7.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 4.6MB - Virtual size: 4.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ