Static task
static1
Behavioral task
behavioral1
Sample
NEAS.fda0dd0fd6963cef2421697cc42dd8e0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.fda0dd0fd6963cef2421697cc42dd8e0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.fda0dd0fd6963cef2421697cc42dd8e0_JC.exe
-
Size
33KB
-
MD5
fda0dd0fd6963cef2421697cc42dd8e0
-
SHA1
f7e462e35dd451f421edf5b5e1f7b3b52e327cc4
-
SHA256
6d0714780ccdf46fbf219fc9e81d6fba36ed9a3ddae0e2c9cfddf50a923525b1
-
SHA512
c287be8d1e53c613a89c5a777686b5d0c00f83810975a9809a3a837225480f2c8c39c9883e18d1b2aa11f783a07e47dcee7470953b1769a20f11d5ac4da97df3
-
SSDEEP
768:+aP8yDSxLD2nOyaPbDce9yh4icCKfJTl1:+a0MiRyaMe9yhZMTX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.fda0dd0fd6963cef2421697cc42dd8e0_JC.exe
Files
-
NEAS.fda0dd0fd6963cef2421697cc42dd8e0_JC.exe.exe windows:5 windows x86
2a71d4f31a0049abe53363fda443e30e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCloneImage
GdiplusStartup
GdiplusShutdown
GdipBitmapGetPixel
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipFree
GdipAlloc
kernel32
HeapFree
FindResourceA
LoadResource
SizeofResource
LockResource
GetProcessHeap
HeapAlloc
CreateFileW
WriteFile
CloseHandle
lstrcatW
OutputDebugStringW
FreeLibrary
GetCurrentProcess
GetProcAddress
LoadLibraryW
LoadLibraryA
user32
UpdateWindow
ShowWindow
CreateWindowExW
RegisterClassExW
LoadCursorW
LoadIconW
DefWindowProcW
InvalidateRect
PostQuitMessage
SendMessageW
GetMessageW
wvsprintfW
EndPaint
FillRect
GetClientRect
BeginPaint
DispatchMessageW
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ