Static task
static1
Behavioral task
behavioral1
Sample
FeelgoodNeonZR.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
FeelgoodNeonZR.exe
Resource
win10v2004-20230220-en
General
-
Target
FeelgoodNeonZR.exe
-
Size
3.5MB
-
MD5
d1cf20f6323090d19df552177c67b18e
-
SHA1
9cb4ff37baf22a86359290c4697d7a854a62d33b
-
SHA256
0f56858300fce4707a61b95f60d39a66af7e3cacf98a68bfd61a26ef4becf759
-
SHA512
4e5ee87894e2196cab34ce1f9855ff6578e83c56b4bd42387aed1d732fe3ee01108b789fb540c3b3d84f8e3d715847fcf9d1c26c6dec33fa2833023421853d75
-
SSDEEP
49152:IkStCATR0JiJiHylKJG0yHx8qmwlS+43Fcq/vlZ1GMHcP+AwUGLvDHwb44b/eYpR:pFoHxc/dSP+Aweb44b2YprfQGoi
Malware Config
Signatures
Files
-
FeelgoodNeonZR.exe.exe windows x64
3ee4df5df4238031ce336e012eebc8ea
Code Sign
59:31:eb:38:5d:54:b7:69:b6:d6:38:94:d0:db:c8:89Certificate
IssuerCN=resistdexteritygeeks,1.2.840.113549.1.9.1=#0c1d7465616d407265736973746465787465726974796765656b732e6e6574Not Before28/10/2022, 00:00Not After28/10/2023, 23:59SubjectCN=resistdexteritygeeks,1.2.840.113549.1.9.1=#0c1d7465616d407265736973746465787465726974796765656b732e6e6574Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetFilePointerEx
RtlCaptureContext
GetConsoleCP
GetTimeZoneInformation
EnumSystemLocalesW
IsValidLocale
GetStdHandle
ExitProcess
GetFileType
SetStdHandle
QueryPerformanceFrequency
GetCommandLineW
GetCommandLineA
FreeLibraryAndExitThread
CreateThread
HeapQueryInformation
VirtualQuery
VirtualAlloc
GetSystemInfo
RtlUnwindEx
RtlPcToFileHeader
LCMapStringW
GetStringTypeW
OutputDebugStringW
CreateEventW
WaitForSingleObjectEx
ResetEvent
Sleep
SearchPathA
GetProfileIntA
GetTickCount
GetTempPathA
VerifyVersionInfoA
VerSetConditionMask
GetWindowsDirectoryA
FindResourceExW
lstrcpyA
GetACP
SystemTimeToTzSpecificLocalTime
GetFileSizeEx
GetFileAttributesExA
FileTimeToLocalFileTime
GetVolumeInformationA
MoveFileA
lstrcmpiA
GetCurrentProcess
DuplicateHandle
WriteFile
UnlockFile
SetEndOfFile
ReadFile
LockFile
GetFileSize
FlushFileBuffers
FindFirstFileA
FindClose
DeleteFileA
CreateFileA
GetCPInfo
GetOEMCP
GetUserDefaultUILanguage
GetLocaleInfoW
CompareStringW
GetVersionExA
ResumeThread
SetThreadPriority
WaitForSingleObject
SetEvent
CloseHandle
GlobalFlags
FileTimeToSystemTime
lstrcmpA
GetModuleFileNameA
LocalReAlloc
LocalAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
GetUserDefaultLCID
ReplaceFileA
GetTempFileNameA
GetFullPathNameA
GetFileTime
GetDiskFreeSpaceA
GetCurrentProcessId
CompareStringA
QueryActCtxW
FindActCtxSectionStringW
DeactivateActCtx
ActivateActCtx
CreateActCtxW
GlobalGetAtomNameA
GlobalFindAtomA
GlobalAddAtomA
LoadLibraryW
lstrcmpW
GlobalDeleteAtom
LoadLibraryExW
GetModuleHandleExW
GetModuleHandleW
GetModuleFileNameW
FreeResource
FreeLibrary
GetSystemDirectoryW
GetCurrentThreadId
EncodePointer
OutputDebugStringA
CopyFileA
FormatMessageA
MulDiv
LocalFree
GlobalFree
GlobalUnlock
GlobalLock
GlobalSize
GlobalAlloc
MultiByteToWideChar
SystemTimeToFileTime
SetFilePointer
LocalFileTimeToFileTime
GetFileAttributesA
GetCurrentDirectoryA
GetProcAddress
GetModuleHandleA
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
GetLastError
RaiseException
DecodePointer
GetThreadLocale
IsBadReadPtr
LoadLibraryA
VirtualProtect
VirtualFree
GetNativeSystemInfo
SetLastError
GetConsoleScreenBufferInfoEx
EnumSystemCodePagesW
SetCalendarInfoA
WideCharToMultiByte
GetDateFormatW
GetFileInformationByHandleEx
SetComputerNameW
MoveFileWithProgressW
GetAtomNameA
AddAtomW
GlobalFindAtomW
FindResourceW
FindResourceA
CreateSemaphoreW
DosDateTimeToFileTime
GetTapeStatus
GetCommConfig
GetThreadSelectorEntry
LocalLock
SizeofResource
LockResource
LoadResource
FreeLibraryWhenCallbackReturns
ExitThread
FlsSetValue
WaitForDebugEvent
SetFileTime
GetVolumeInformationByHandleW
GetConsoleMode
GetEnvironmentVariableA
CreateFileW
user32
GetSystemMenu
IsRectEmpty
UnionRect
ShowOwnedPopups
MapVirtualKeyA
GetKeyNameTextA
MapDialogRect
GetAsyncKeyState
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamA
PostQuitMessage
GetCursorPos
TranslateMessage
GetMessageA
CopyImage
SystemParametersInfoA
InflateRect
GetMenuItemInfoA
FillRect
GetWindowDC
TabbedTextOutA
GrayStringA
DrawTextExA
DrawTextA
RealChildWindowFromPoint
ClientToScreen
LoadCursorA
GetSysColorBrush
GetSystemMetrics
ReleaseDC
GetDC
ReuseDDElParam
UnpackDDElParam
LoadImageA
DestroyIcon
GetWindowThreadProcessId
GetDesktopWindow
OffsetRect
IntersectRect
SetRectEmpty
SetCursor
InvalidateRect
InsertMenuItemA
DestroyMenu
CreatePopupMenu
LoadMenuA
TranslateAcceleratorA
LoadAcceleratorsA
ReleaseCapture
GetActiveWindow
BringWindowToTop
IsDialogMessageA
SetWindowTextA
IsWindowEnabled
SendDlgItemMessageA
CheckDlgButton
MoveWindow
ShowWindow
GetMonitorInfoA
MonitorFromWindow
WinHelpA
GetScrollInfo
SetScrollInfo
LoadIconW
LoadIconA
CallNextHookEx
SetWindowsHookExA
DeleteMenu
GetLastActivePopup
GetTopWindow
GetClassNameA
GetClassLongPtrA
GetClassLongA
SetWindowLongPtrA
GetWindowLongPtrA
KillTimer
GetWindowLongA
PtInRect
EqualRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
MessageBoxA
AdjustWindowRectEx
GetWindowRect
GetClientRect
GetWindowTextLengthA
GetWindowTextA
RemovePropA
GetPropA
SetPropA
ShowScrollBar
GetScrollRange
SetScrollRange
WindowFromPoint
SetRect
EnableWindow
GetMenuStringA
GetMenuState
GetSubMenu
GetScrollPos
SetScrollPos
ScrollWindow
RedrawWindow
ValidateRect
EndPaint
BeginPaint
SetForegroundWindow
GetForegroundWindow
SetActiveWindow
UpdateWindow
TrackPopupMenu
SetMenu
GetMenu
GetCapture
GetKeyState
SetFocus
GetDlgCtrlID
GetDlgItem
IsIconic
SetCapture
LockWindowUpdate
GetNextDlgGroupItem
DrawFocusRect
DrawIconEx
GetIconInfo
MessageBeep
EnableScrollBar
HideCaret
InvertRect
LoadCursorW
NotifyWinEvent
GetMenuDefaultItem
SetLayeredWindowAttributes
EnumDisplayMonitors
SetClassLongPtrA
FrameRect
SetWindowRgn
OpenClipboard
SetParent
CharUpperA
LoadAcceleratorsW
LoadMenuW
TrackMouseEvent
LoadImageW
GetWindow
SetTimer
GetMenuItemID
GetMenuItemCount
InsertMenuA
AppendMenuA
RemoveMenu
UnhookWindowsHookEx
SendMessageA
GetFocus
CheckMenuItem
EnableMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
SetMenuItemInfoA
GetParent
LoadBitmapW
RegisterWindowMessageA
DispatchMessageA
PeekMessageA
GetMessagePos
GetMessageTime
PostMessageA
DefWindowProcA
CallWindowProcA
RegisterClassA
GetClassInfoA
GetClassInfoExA
CreateWindowExA
IsWindow
IsMenu
IsChild
DestroyWindow
SetWindowPos
GetWindowPlacement
SetWindowPlacement
BeginDeferWindowPos
DeferWindowPos
EndDeferWindowPos
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
DrawStateA
DrawEdge
DrawFrameControl
IsZoomed
SetCursorPos
DestroyCursor
CopyIcon
CreateMenu
SubtractRect
TranslateMDISysAccel
DefMDIChildProcA
DefFrameProcA
DrawMenuBar
GetUpdateRect
IsClipboardFormatAvailable
CharUpperBuffA
RegisterClipboardFormatA
ModifyMenuA
GetDoubleClickTime
SetMenuDefaultItem
CopyAcceleratorTableA
DestroyAcceleratorTable
CreateAcceleratorTableA
ToAsciiEx
GetKeyboardState
MapVirtualKeyExA
IsCharLowerA
GetKeyboardLayout
WaitMessage
PostThreadMessageA
GetComboBoxInfo
MonitorFromPoint
UpdateLayeredWindow
DrawIcon
SetWindowLongA
GetWindowRgn
gdi32
GetObjectType
GetPixel
GetStockObject
GetViewportExtEx
GetWindowExtEx
IntersectClipRect
LineTo
PtVisible
RectVisible
RestoreDC
SaveDC
SelectClipRgn
ExtSelectClipRgn
SelectObject
SelectPalette
SetBkMode
SetMapMode
SetLayout
GetLayout
SetPolyFillMode
SetROP2
SetTextAlign
MoveToEx
TextOutA
ExtTextOutA
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
OffsetViewportOrgEx
OffsetWindowOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetTextExtentPoint32A
CombineRgn
CreateRectRgnIndirect
PatBlt
GetClipBox
DPtoLP
GetTextMetricsA
EnumFontFamiliesExA
GetBkColor
CreatePalette
GetNearestPaletteIndex
GetPaletteEntries
GetSystemPaletteEntries
RealizePalette
CreateDIBitmap
EnumFontFamiliesA
GetTextCharsetInfo
SetPixel
StretchBlt
CreateDIBSection
SetDIBColorTable
CreateEllipticRgn
Ellipse
GetTextColor
CreatePolygonRgn
Polygon
Polyline
CreateRoundRectRgn
LPtoDP
Rectangle
GetRgnBox
OffsetRgn
RoundRect
FillRgn
FrameRgn
GetBoundsRect
PtInRegion
ExtFloodFill
SetPaletteEntries
SetPixelV
GetWindowOrgEx
GetViewportOrgEx
GetTextFaceA
ExcludeClipRect
Escape
DeleteDC
CreateSolidBrush
CreateRectRgn
CreatePatternBrush
CreatePen
CreateHatchBrush
BitBlt
DeleteObject
CreateFontIndirectA
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectA
SetTextColor
SetBkColor
CreateBitmap
GetDeviceCaps
SetRectRgn
CopyMetaFileA
CreateDCA
msimg32
AlphaBlend
TransparentBlt
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegEnumKeyExA
RegSetValueExA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
GetFileSecurityA
SetFileSecurityA
RegCloseKey
RegEnableReflectionKey
GetCurrentHwProfileW
NotifyChangeEventLog
BackupEventLogA
CreateRestrictedToken
shell32
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHGetFileInfoA
DragFinish
DragQueryFileA
ord68
ord88
SHCreateItemInKnownFolder
SHFileOperationW
CommandLineToArgvW
SHGetDriveMedia
SHBrowseForFolderA
SHAppBarMessage
shlwapi
StrFormatKBSizeA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathRemoveFileSpecW
uxtheme
GetThemeSysColor
GetWindowTheme
GetCurrentThemeName
GetThemeColor
DrawThemeText
DrawThemeBackground
IsThemeBackgroundPartiallyTransparent
DrawThemeParentBackground
OpenThemeData
CloseThemeData
GetThemePartSize
IsAppThemed
ole32
RevokeDragDrop
RegisterDragDrop
CoLockObjectExternal
OleGetClipboard
DoDragDrop
OleLockRunning
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
OleTranslateAccelerator
IsAccelerator
CoInitializeEx
CreateStreamOnHGlobal
CoInitialize
CoUninitialize
CoCreateInstance
CoDisconnectObject
ReleaseStgMedium
OleDuplicateData
CoTaskMemFree
CoTaskMemAlloc
oleaut32
LoadTypeLi
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
VariantChangeType
VariantCopy
VarBstrFromDate
SysAllocString
VariantClear
VariantInit
SysAllocStringByteLen
SysAllocStringLen
SysFreeString
oledlg
OleUIChangeSourceW
ord7
ord9
OleUIAddVerbMenuW
OleUIPromptUserW
ord11
oleacc
AccessibleObjectFromWindow
LresultFromObject
CreateStdAccessibleObject
gdiplus
GdipDrawImageRectI
GdipSetInterpolationMode
GdipCreateFromHDC
GdipCreateBitmapFromHBITMAP
GdipDrawImageI
GdipDeleteGraphics
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePaletteSize
GdipGetImagePalette
GdipGetImagePixelFormat
GdipGetImageHeight
GdipGetImageWidth
GdipGetImageGraphicsContext
GdipDisposeImage
GdipCloneImage
GdiplusStartup
GdipFree
GdipAlloc
GdiplusShutdown
imm32
ImmGetContext
ImmGetOpenStatus
ImmReleaseContext
winmm
PlaySoundA
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 771KB - Virtual size: 770KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 267KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.giats Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ