Behavioral task
behavioral1
Sample
NEAS.0bd63b8543c78588c19579fd7901cee0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.0bd63b8543c78588c19579fd7901cee0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.0bd63b8543c78588c19579fd7901cee0_JC.exe
-
Size
129KB
-
MD5
0bd63b8543c78588c19579fd7901cee0
-
SHA1
74893b6f42f39f1a85cdfd5440eeeff25ca94b83
-
SHA256
0dee4892fbb63e22e670a6b3af740ea0654c2ced43c8f08b9e5f84f8808ce6f5
-
SHA512
87243cadc1464c9058016f8c077dc1bea2382ba4af8e042b980df00323313bb94495a66056b1d8efbb427cf3f4b4549ef097c60cc7fdc3cc81d8aa346b309380
-
SSDEEP
384:I2+sTimx3/RoL7p9MAKmjQxv8Timx0XWGFatkvQR8uzHKdu8h+0S1tdYjQbZ:7+PrL7QAKO2nyd6urKmaaZ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.0bd63b8543c78588c19579fd7901cee0_JC.exe
Files
-
NEAS.0bd63b8543c78588c19579fd7901cee0_JC.exe.exe windows:5 windows x86
a61ba93a22191636008350381dfd1d6d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
HeapCreate
HeapAlloc
GetACP
ExitProcess
FreeLibrary
advapi32
RegQueryValueExA
RegOpenKeyA
GetUserNameA
CopySid
GetLengthSid
gdi32
IntersectClipRect
ExcludeClipRect
UpdateColors
DeleteObject
TextOutA
SetBkColor
SetTextColor
Rectangle
CreateSolidBrush
GetStockObject
CreateFontIndirectA
GetTextExtentExPointA
GetTextMetricsA
CreateFontA
imm32
ImmGetCompositionStringW
ImmSetCompositionFontA
ImmGetContext
ImmSetCompositionWindow
msacm32
acmMetrics
acmStreamOpen
user32
GetMessageA
DefWindowProcA
PostQuitMessage
GetDoubleClickTime
GetQueueStatus
LoadIconA
RegisterClassA
Sections
UPX0 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE