Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0f399e90fa40786751470fa56629cd90_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0f399e90fa40786751470fa56629cd90_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.0f399e90fa40786751470fa56629cd90_JC.exe
-
Size
152KB
-
MD5
0f399e90fa40786751470fa56629cd90
-
SHA1
06231a2d6dc744751e9d27bfdbcd14f93b4a482a
-
SHA256
0e59b6d7631ca42293b0b57a68c966bea6ccfe3ca71d15b894ab5afd2a2b790a
-
SHA512
362c86a9ace313548c32a4708f518ed3c98bc78f5a04c870a6746806cdb137a3db80d72c6b4e992edea7f597cc12ccba96ce1621d1fc40f9cba0ed2e33a94ca1
-
SSDEEP
3072:OWCx9j20nfnCCnJAhZ4nPoya/J73+MwvvOjwS8:O9y0Pnnm4nPoysJzt+vOjx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.0f399e90fa40786751470fa56629cd90_JC.exe
Files
-
NEAS.0f399e90fa40786751470fa56629cd90_JC.exe.exe windows:4 windows x86
01bbea2e469bc71e1a6cebc682dd25af
Headers
Imports
ws2_32
WSACleanup
ntohs
inet_ntoa
gethostname
iphlpapi
GetAdaptersInfo
mfc42
ord4976
ord4377
ord4854
ord4998
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5287
ord3798
ord4835
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord800
ord609
ord656
ord768
ord860
ord540
ord567
ord489
ord825
ord2362
ord2358
ord4358
ord5265
ord4948
ord4258
ord2642
ord6334
ord4710
ord2764
ord4224
ord6283
ord6282
ord3874
ord3092
ord2379
ord535
ord2818
ord6199
ord537
ord4129
ord6877
ord4160
ord858
ord1175
ord3721
ord686
ord384
ord795
ord3996
ord2862
ord2097
ord1105
ord6007
ord6905
ord941
ord6907
ord2820
ord3811
ord3998
ord3301
ord2614
ord6453
ord665
ord1979
ord6385
ord939
ord3286
ord5186
ord354
ord4202
ord3175
ord641
ord3499
ord2515
ord355
ord6696
ord4376
ord5280
ord2301
ord2302
ord4234
ord4853
ord2370
ord5160
ord4278
ord2763
ord5450
ord6394
ord5440
ord6383
ord2582
ord4402
ord3640
ord693
ord4243
ord4220
ord2584
ord3654
ord2438
ord6270
ord2863
ord3910
ord1644
ord1146
ord1908
ord1690
ord5288
ord4439
ord2054
ord4431
ord771
ord1008
ord2575
ord497
ord4259
ord5849
ord3475
ord4299
ord6880
ord6215
ord4715
ord5056
ord5718
ord2109
ord924
ord755
ord470
ord2078
ord2646
ord5710
ord4277
ord922
ord2915
ord2860
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord616
ord2299
ord2803
ord5583
ord690
ord5207
ord2638
ord6059
ord389
ord4673
ord541
ord801
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord2621
ord1134
ord1247
ord926
ord2725
ord6663
ord6883
ord798
ord1997
ord5465
ord532
ord6143
ord5856
ord5442
ord1158
ord6648
ord5861
ord3097
ord3719
ord793
ord2363
ord2029
ord2077
ord523
ord3610
ord1907
ord823
ord4742
ord4905
ord3574
ord5162
ord5161
ord4837
ord4424
ord3402
ord1776
ord5290
ord4396
ord2864
ord6055
ord3663
ord3597
ord324
ord1168
ord1576
msvcrt
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
exit
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_exit
_onexit
__dllonexit
sscanf
time
srand
rand
isdigit
isalpha
toupper
atoi
atol
memset
memcpy
strlen
strcpy
_mbscmp
_setmbcp
__CxxFrameHandler
_XcptFilter
_EH_prolog
sprintf
kernel32
GetPrivateProfileStringA
LoadLibraryA
GetModuleHandleA
FreeLibrary
GetLastError
CreateFileMappingA
CloseHandle
GetModuleFileNameA
GetPrivateProfileIntA
GetVersion
GetCommandLineA
GetSystemDirectoryA
WritePrivateProfileStringA
GetStartupInfoA
Sleep
GetProcAddress
user32
GetSubMenu
LoadMenuA
LoadIconA
AppendMenuA
GetSystemMenu
KillTimer
GetCursorPos
GetSystemMetrics
GetClientRect
GetParent
IsIconic
RegisterHotKey
UnregisterHotKey
IsWindow
MessageBoxA
SetActiveWindow
EnableWindow
SendMessageA
GetWindowRect
SetTimer
DrawIcon
PostMessageA
advapi32
QueryServiceStatus
OpenSCManagerA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
RegCloseKey
RegSetValueExA
RegCreateKeyExA
shell32
ShellExecuteA
Sections
Size: 148KB - Virtual size: 148KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE