Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6a2b3858e414e2e901bc5623c6c0f9d0_JC.exe
Resource
win7-20231020-en
General
-
Target
NEAS.6a2b3858e414e2e901bc5623c6c0f9d0_JC.exe
-
Size
32KB
-
MD5
6a2b3858e414e2e901bc5623c6c0f9d0
-
SHA1
2b632c50dd3bc3e36c5ce56ad1207e9e3f191219
-
SHA256
70f256fd64c96d399fced47cac76cd7824fe3bccd25e284a072c22ec9fb1f32b
-
SHA512
f78bfc6755de0eb399ee577fafa03e4f67f623e420a725dba588ae0ed1469db31063b634b9ad376152d885eeb45aec6a26830f76ec8eea6af4c773e0db008c93
-
SSDEEP
384:iUhjDz6g+ApyKufuFMB9S1RzIRMtHrsW6QsPu3XM8:iUhjDzf/MKufZ91RuR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.6a2b3858e414e2e901bc5623c6c0f9d0_JC.exe
Files
-
NEAS.6a2b3858e414e2e901bc5623c6c0f9d0_JC.exe.exe windows:4 windows x86
9b451c669b68bf5a627d22314b159682
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord621
ord516
ord626
ord666
ord598
ord631
ord632
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord608
ord716
ProcCallEngine
ord535
ord537
ord645
ord570
ord648
ord573
ord685
ord100
ord579
ord618
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ