Behavioral task
behavioral1
Sample
262352476d70cc68f3323e99982cf3825b5f95cf401f5dcee2c5f5261512f8bf_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
262352476d70cc68f3323e99982cf3825b5f95cf401f5dcee2c5f5261512f8bf_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
262352476d70cc68f3323e99982cf3825b5f95cf401f5dcee2c5f5261512f8bf_JC.exe
-
Size
3.1MB
-
MD5
833826ea33f4735eed7e5e050d7bba58
-
SHA1
6d800d314f4a625ee2529bf0960f10bfeac6e86d
-
SHA256
262352476d70cc68f3323e99982cf3825b5f95cf401f5dcee2c5f5261512f8bf
-
SHA512
3dadf5909894aba9fc894bec0dde77d3a7a0be90efd25a861ae51e1739c999759e2935befbec30edcffa912a06683f6937e8e95f41d4814c8bdd5fce1ad9fdc5
-
SSDEEP
49152:jXMxu8c3IFOmd83ml5hDR8+mPKXg5CFM4z+Op4yF3LMtW6HBOFE9Lk1pIqZmgmJc:jcY3IxgmlL1TlfB4yF7YwMUmgm+N
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 262352476d70cc68f3323e99982cf3825b5f95cf401f5dcee2c5f5261512f8bf_JC.exe
Files
-
262352476d70cc68f3323e99982cf3825b5f95cf401f5dcee2c5f5261512f8bf_JC.exe.exe windows:4 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
Size: 116KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 510B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 15B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.imports Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ