DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3a8eb8680110774acfc63a56cf07bdc8711593cc24963c09abe8b89ece394ab0_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.3a8eb8680110774acfc63a56cf07bdc8711593cc24963c09abe8b89ece394ab0_JC.dll
Resource
win10v2004-20230915-en
Target
NEAS.3a8eb8680110774acfc63a56cf07bdc8711593cc24963c09abe8b89ece394ab0_JC.exe
Size
479KB
MD5
a52b3a082169b416753b69b699a09377
SHA1
055b45d5f954fedcfcabfd330bc870540f1cb2fd
SHA256
3a8eb8680110774acfc63a56cf07bdc8711593cc24963c09abe8b89ece394ab0
SHA512
1f24609c6ecea18e0d66c1aeeff5898a7e5cc66a5dce6ea0d415d0c329f305beff377948a9bbb4011dbfb4b63e4aee499873c358f63e2ea0c11e90699b9dfe2a
SSDEEP
6144:v1Ridz+aAaiTe1ZkiUiCx6wp41lhu9vwsMcCJO1EafRieBNx34XzzkE5Mxz3HtgP:9Ridz+aAaiTe1ZkVUhaeO1FxudxoR2
Checks for missing Authenticode signature.
resource |
---|
NEAS.3a8eb8680110774acfc63a56cf07bdc8711593cc24963c09abe8b89ece394ab0_JC.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
vDbgPrintExWithPrefix
RegCloseKey
RegCreateKeyExW
RegCreateKeyW
RegDeleteKeyW
RegEnumKeyExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
RegSetValueExW
CloseHandle
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
FindResourceW
FlushInstructionCache
FreeLibrary
FreeLibraryAndExitThread
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetProcessHeap
GetSystemPowerStatus
GetSystemTimeAsFileTime
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
LockResource
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReleaseSemaphore
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
lstrcmpiW
lstrlenW
__dllonexit
_amsg_exit
_initterm
_iob
_lock
_memicmp
_onexit
_unlock
_vscwprintf
_vsnprintf
abort
bsearch
calloc
free
fwrite
iswspace
malloc
memcmp
memmove
realloc
sprintf
strchr
strcmp
strcpy
strcspn
strncmp
strrchr
swprintf
vfprintf
vsprintf
vswprintf
wcscat
wcschr
wcscpy
wcslen
wcstol
wcstoul
CoCreateInstance
CoInitializeEx
CoUninitialize
StringFromGUID2
EnumPwrSchemes
GetActivePwrScheme
SetActivePwrScheme
CM_Get_DevNode_Registry_PropertyW
CM_Get_DevNode_Status
CM_Request_Device_Eject_ExW
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsW
ShellExecuteW
Shell_NotifyIconW
StrCpyW
mixerGetID
waveOutMessage
AppendMenuW
CallWindowProcW
CheckMenuRadioItem
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DeregisterShellHookWindow
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
GetCursorPos
GetDoubleClickTime
GetMessageW
GetWindowLongW
KillTimer
LoadCursorW
LoadIconW
LoadStringW
MessageBoxW
PostQuitMessage
RegisterClassExW
RegisterShellHookWindow
RegisterWindowMessageW
SendMessageW
SetForegroundWindow
SetMenuDefaultItem
SetTimer
SetWindowLongW
SystemParametersInfoW
TrackPopupMenuEx
TranslateMessage
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ