Static task
static1
Behavioral task
behavioral1
Sample
NEAS.06ad67c7dbe98d357e4bd074de6a1c30_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.06ad67c7dbe98d357e4bd074de6a1c30_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.06ad67c7dbe98d357e4bd074de6a1c30_JC.exe
-
Size
210KB
-
MD5
06ad67c7dbe98d357e4bd074de6a1c30
-
SHA1
f64d4b3937f48a997f08f5c7c7fec78052e3adba
-
SHA256
d4c17d53261054b89a0d95bdba392da8d55e448b3fcb4d7f50a0b7471cb95266
-
SHA512
4c1f9abea02da431bb535aeb008c283723260b21dc26f6dc898b8d9a57c6101a12d0966650f15de509557446fbe887ab1170dd5696ad6c3ab481968f549ff4dc
-
SSDEEP
3072:HeI+O5HNkDxtVagroHSCpNce3oPOM7TC7BbCk+dZpp5bdAXPVaefq4Nxi/3:95YRjBh3C7dULPiPVBg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.06ad67c7dbe98d357e4bd074de6a1c30_JC.exe
Files
-
NEAS.06ad67c7dbe98d357e4bd074de6a1c30_JC.exe.exe windows:4 windows x86
291e66575f7eab098d6da15fc612df8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
ExitProcess
SetCurrentDirectoryW
GetModuleFileNameA
SetUnhandledExceptionFilter
GetFileAttributesW
SleepEx
GlobalDeleteAtom
GetExpandedNameW
lstrcpyW
GetProcAddress
CreateSemaphoreW
FileTimeToSystemTime
GetCurrentThread
GetProcessHeap
SearchPathA
GetNamedPipeInfo
CreatePipe
CreateEventW
GetModuleHandleA
MoveFileW
GetEnvironmentStringsW
GetNumberFormatA
GetLocaleInfoA
GetLocaleInfoW
GetTempPathA
GetLogicalDriveStringsW
ExpandEnvironmentStringsW
user32
SetDlgItemTextA
DefDlgProcA
GetClassLongA
PostQuitMessage
SetWindowLongW
LoadBitmapW
MessageBeep
CharUpperW
LoadMenuW
GetMessageA
CallWindowProcW
GetCursorPos
PostMessageW
GetCaretPos
CreateDesktopW
gdi32
CreateDCW
ColorCorrectPalette
GetRgnBox
SetTextAlign
GetTextColor
GetEnhMetaFileDescriptionA
UnrealizeObject
SetRectRgn
GetFontData
GetCharacterPlacementW
WidenPath
GetTextMetricsA
GetCharacterPlacementA
RemoveFontResourceExA
PaintRgn
PtVisible
LPtoDP
EndDoc
advapi32
RegOpenKeyExW
RegOpenKeyA
RegEnumValueA
RegEnumValueW
RegSaveKeyA
RegOpenKeyA
shell32
SHGetFileInfoA
SHGetFolderPathA
ole32
CoUninitialize
CoGetDefaultContext
CLSIDFromProgID
CoGetCurrentProcess
inetcomm
MimeOleGetFileInfo
EssContentHintEncodeEx
MimeOleGenerateCID
HrAthGetFileName
Sections
.ic Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.UNw Size: 2KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.NDmj Size: 3KB - Virtual size: 378KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xvpfQY Size: 512B - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.cEMrQ Size: 4KB - Virtual size: 271KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AxGj Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FiaGd Size: 5KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Nfre Size: 2KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ctr Size: 3KB - Virtual size: 438KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HBzd Size: 1KB - Virtual size: 466KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ