Behavioral task
behavioral1
Sample
NEAS.5c8973979aff0c184a7983f4120f4030_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.5c8973979aff0c184a7983f4120f4030_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.5c8973979aff0c184a7983f4120f4030_JC.exe
-
Size
612KB
-
MD5
5c8973979aff0c184a7983f4120f4030
-
SHA1
78557af528aa127d0d704b851c814bfdc3dd2808
-
SHA256
3e29081420782695057308dc1e47732dba6736c59bf3c40d6e35d08e9bebe848
-
SHA512
717c963de5fc81f14fc92c83adad269e5793380e4c15444fc7b455da57bfae02ee1e84897a14b3e240657e5ef1c0025baf3d06976af6fc01aab06d9ca2335621
-
SSDEEP
12288:qHFmnJJzXF1etO1Y6UnMsNW8hLahTlIuQHAGzl72/DrfKeSU:IsJJ514JZNWS2hTXOL7/
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.5c8973979aff0c184a7983f4120f4030_JC.exe
Files
-
NEAS.5c8973979aff0c184a7983f4120f4030_JC.exe.exe windows:4 windows x86
479c84abb8aac4f674a73c8532c0b37c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalGetAtomNameA
GetModuleHandleA
LoadLibraryA
LocalAlloc
LocalFree
GetModuleFileNameA
ExitProcess
user32
GetPropA
gdi32
SetTextColor
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
advapi32
RegSetValueExA
comctl32
ord17
wininet
InternetQueryOptionA
Sections
.text Size: - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 442KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 604KB - Virtual size: 601KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE