DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.051299a66f8433a99d646e1dbc8c44a0_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.051299a66f8433a99d646e1dbc8c44a0_JC.dll
Resource
win10v2004-20230915-en
Target
NEAS.051299a66f8433a99d646e1dbc8c44a0_JC.exe
Size
424KB
MD5
051299a66f8433a99d646e1dbc8c44a0
SHA1
394769e7fa26a2ab9213c33c3c4765129291026c
SHA256
861c9d6bf368dca5081815447ec3ad686395ec571a1f1c22438731211db516ad
SHA512
a72e0e00ba356ceb4b3978271cf2bff0b2a499da801e2a6177fc964792fe00f4a2e1bf4c8b9f891676fb4f3301bcfe426f57d5b9b58e0bfedf7659b7160ae4fd
SSDEEP
6144:wb8ZPnJ0SMpC7PIfZ3Ibi13QVSydQJzy0gkbByjWHIPihp5VHkc:wb8ZPnJ0W7PIfZ4biuFdOjByjQnVE
Checks for missing Authenticode signature.
resource |
---|
NEAS.051299a66f8433a99d646e1dbc8c44a0_JC.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
FreeLibrary
GetModuleHandleA
GetProcAddress
LoadLibraryExA
CompareStringW
CompareStringA
lstrcmpiA
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetLocaleInfoA
EnterCriticalSection
LeaveCriticalSection
GetUserDefaultLCID
GetModuleFileNameW
InitializeCriticalSection
DeleteCriticalSection
RtlUnwind
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
HeapFree
HeapAlloc
RaiseException
GetCommandLineA
GetCurrentThreadId
SetLastError
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
GetProcessHeap
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
HeapSize
GetFileType
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
LoadLibraryExW
OutputDebugStringW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
HeapReAlloc
SetStdHandle
WriteConsoleW
FlushFileBuffers
CreateFileW
CloseHandle
CoGetMalloc
CoCreateGuid
IIDFromString
VarBstrFromI4
SafeArrayPutElement
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
CreateStdDispatch
SysAllocString
VariantInit
VariantClear
SysAllocStringLen
SysReAllocStringLen
SysFreeString
SysStringByteLen
SysAllocStringByteLen
VariantCopy
VariantChangeType
VarI2FromStr
VarI4FromStr
VarR4FromStr
VarR8FromStr
VarDateFromStr
VarCyFromStr
VarBstrFromI2
SafeArrayAccessData
VarBstrFromR4
VarBstrFromR8
VarBstrFromCy
VarBstrFromDate
VarBstrFromDec
VarDecFromStr
LHashValOfNameSys
SafeArrayCreate
SafeArrayDestroy
SafeArrayGetElemsize
SafeArrayGetUBound
SafeArrayGetLBound
IsCharAlphaA
IsCharAlphaW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ