Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4d8a1a912c7dd8a77dc1610a33003240_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.4d8a1a912c7dd8a77dc1610a33003240_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.4d8a1a912c7dd8a77dc1610a33003240_JC.exe
-
Size
453KB
-
MD5
4d8a1a912c7dd8a77dc1610a33003240
-
SHA1
14cc7238cd4e6357e04ef4bd5564e44adc377bd7
-
SHA256
fbf83225989f75420816c2ba12e54dc1dd3f9c1ef22d141540fbc740ba805db8
-
SHA512
c773d12fc754258a1280c2b46c3827f2ac655c02697229d5607ab64eb315001d7e78c6dad6f7bc29bdc7002460962f695fb895873d1d813a77cbe412ab5315c9
-
SSDEEP
12288:o/D6tDiAbURT8U5VqF1wD7HxvE2L6Q16F9O:o/DFRVSF+9E2L6Q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.4d8a1a912c7dd8a77dc1610a33003240_JC.exe
Files
-
NEAS.4d8a1a912c7dd8a77dc1610a33003240_JC.exe.exe windows:1 windows x86
efd64979adc7f9e8aae1d77756433b49
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
RtlUnwind
GetModuleHandleW
crtdll
__GetMainArgs
exit
raise
signal
ulib
??1ARGUMENT_LEXEMIZER@@UAE@XZ
??0DSTRING@@QAE@XZ
??0STRING_ARGUMENT@@QAE@XZ
??0ARRAY@@QAE@XZ
??0ARGUMENT_LEXEMIZER@@QAE@XZ
??0FLAG_ARGUMENT@@QAE@XZ
?Initialize@ARRAY@@QAEEKK@Z
?Initialize@ARGUMENT_LEXEMIZER@@QAEEPAVARRAY@@@Z
?SetCaseSensitive@ARGUMENT_LEXEMIZER@@QAEXE@Z
?PrepareToParse@ARGUMENT_LEXEMIZER@@QAEEPAVWSTRING@@@Z
ntdll
RtlFreeHeap
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 7KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ