Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b427cbab1c6da03a866775d3a462056d44eac986553fefc57b6132009879d50c_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.b427cbab1c6da03a866775d3a462056d44eac986553fefc57b6132009879d50c_JC.exe
-
Size
4.3MB
-
MD5
b0e5a9d31e9ab7ee55413743cfd32173
-
SHA1
b6cb404ae9f42860641199a8d7eb44cb33fd0955
-
SHA256
b427cbab1c6da03a866775d3a462056d44eac986553fefc57b6132009879d50c
-
SHA512
17a088ab790d485170e269c1fd720cfb99bea3ce8d73465f5fac6d1cdc259170548bae765864d3e95f691dd48741bb467e57054b218108c1bf15c0c8150e9579
-
SSDEEP
98304:dwFGqIHRNyQ7dXbJVvpuZS9QOyuUd7VQ30qCdYldDWMZD:rHR5FpuZlO5UdWxXzDWMZD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.b427cbab1c6da03a866775d3a462056d44eac986553fefc57b6132009879d50c_JC.exe
Files
-
NEAS.b427cbab1c6da03a866775d3a462056d44eac986553fefc57b6132009879d50c_JC.exe.exe windows:4 windows x86
2dd85160c22c385a11df487a47e3143d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
midiStreamOut
ws2_32
WSACleanup
kernel32
GetVersion
user32
GetWindow
gdi32
ExtSelectClipRgn
winspool.drv
OpenPrinterA
advapi32
RegQueryValueExA
shell32
Shell_NotifyIconA
ole32
CLSIDFromProgID
oleaut32
VariantClear
comctl32
ImageList_Add
comdlg32
ChooseColorA
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 2.4MB - Virtual size: 3.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.code Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ