Behavioral task
behavioral1
Sample
NEAS.019c8e9d10c6a60b1d53c585ee18f460_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.019c8e9d10c6a60b1d53c585ee18f460_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.019c8e9d10c6a60b1d53c585ee18f460_JC.exe
-
Size
26KB
-
MD5
019c8e9d10c6a60b1d53c585ee18f460
-
SHA1
24407df68956b9fd26ef4b8e5398d069bed08046
-
SHA256
a7d8a159cb5d4b3e796adddd9c4a2da93f937c33494477b3655abdaed03b6824
-
SHA512
ab82719d5bddf384e6211edfe174792655230aceb91976cbe2bc5596fe902ed02428a4868b8520895d26a692d6fda119bed2cdb95fe721cc43a8883285ecaca6
-
SSDEEP
768:S7zAHUYCPQRDAUMbHhKbu5rbIzBrXDJ5+DG:vi4tiBKFlrLkG
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource NEAS.019c8e9d10c6a60b1d53c585ee18f460_JC.exe unpack001/out.upx
Files
-
NEAS.019c8e9d10c6a60b1d53c585ee18f460_JC.exe.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE