Static task
static1
Behavioral task
behavioral1
Sample
NEAS.011c8d92c196235ded9679db3c1f0410_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.011c8d92c196235ded9679db3c1f0410_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.011c8d92c196235ded9679db3c1f0410_JC.exe
-
Size
293KB
-
MD5
011c8d92c196235ded9679db3c1f0410
-
SHA1
79ba5ddf2b779c0df6a1239c7e4afda68ca777fb
-
SHA256
208fbd840cbfe09e339233fd0d6d8d6b8ee524da96dfd0cde7a8d2921fdfc1b4
-
SHA512
bfb1fd9039350d7318e1d0c5d42ddf576d84e72e826f7e9e27740182d84f06b46e2648d15cf9d64504b5d3fa52e5bf20e98975b9142a51063120cb4a509ceb2b
-
SSDEEP
6144:2hmZgSUDmalOLCXeM4q3HZ7jafsgNozozJH5uTBhFW8Ou:2HSU8CtDXZnwsgy8JH5uTNW8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.011c8d92c196235ded9679db3c1f0410_JC.exe
Files
-
NEAS.011c8d92c196235ded9679db3c1f0410_JC.exe.exe windows:4 windows x86
61bfee14a1684369637e3c7fdccd07df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameW
GetFullPathNameA
GetCurrencyFormatW
GetTempFileNameW
GetStartupInfoA
EnumCalendarInfoA
FileTimeToSystemTime
BuildCommDCBAndTimeoutsA
GetTapeParameters
InitAtomTable
FindNextFileA
SetConsoleCursorInfo
OpenFileMappingA
lstrcmpiA
GetVersionExA
GetTempFileNameA
_lread
UnlockFileEx
MoveFileExA
GetVersionExW
GetCompressedFileSizeA
SetConsoleCursorPosition
WritePrivateProfileStructA
SetThreadIdealProcessor
lstrcmpW
GetComputerNameA
ReadProcessMemory
GetSystemTimeAsFileTime
GlobalUnWire
GlobalDeleteAtom
GetEnvironmentStrings
GetCurrentThreadId
CreateFiber
GetLargestConsoleWindowSize
WritePrivateProfileStructW
SetCommTimeouts
FormatMessageA
WriteConsoleOutputAttribute
GetPrivateProfileSectionNamesA
Thread32Next
VirtualFree
GetProcessPriorityBoost
DeleteFileA
SetConsoleOutputCP
lstrlenA
SetProcessAffinityMask
GetModuleHandleW
FindCloseChangeNotification
SetConsoleTitleA
GetModuleHandleA
CopyFileA
QueueUserAPC
LocalReAlloc
MoveFileA
WriteConsoleW
UpdateResourceW
ResumeThread
FoldStringA
WritePrivateProfileSectionA
GetThreadSelectorEntry
GetPrivateProfileSectionW
GlobalGetAtomNameW
AllocConsole
LocalUnlock
EraseTape
PeekNamedPipe
RaiseException
_hread
QueryPerformanceCounter
GetSystemPowerStatus
_lwrite
GetCalendarInfoA
ReadDirectoryChangesW
GetCommState
GlobalFindAtomA
FormatMessageW
GetVersion
GetPrivateProfileSectionA
user32
ChangeClipboardChain
DestroyCaret
WindowFromPoint
SetCapture
ToUnicodeEx
GetTabbedTextExtentW
GetActiveWindow
IsWindowVisible
CharUpperA
GetMenuItemID
ChangeDisplaySettingsW
SetProcessWindowStation
GetScrollInfo
DlgDirSelectExA
SetMenuDefaultItem
EmptyClipboard
SetMenu
IsRectEmpty
ScrollDC
OemToCharBuffA
GetSysColor
MapWindowPoints
UnhookWindowsHook
ValidateRgn
TranslateMDISysAccel
SwitchToThisWindow
CreateWindowExA
GetAsyncKeyState
GetKeyboardType
ShowCursor
DrawTextExA
SetSystemCursor
EnableWindow
CloseWindowStation
IsCharAlphaNumericW
SystemParametersInfoA
MapVirtualKeyExA
GetKeyState
SendDlgItemMessageW
GetKeyboardLayout
SendNotifyMessageW
GetForegroundWindow
OffsetRect
wvsprintfW
SetWindowRgn
DlgDirSelectComboBoxExW
UnregisterClassW
GetMessageExtraInfo
GetDlgItemInt
IsChild
ModifyMenuW
SetClassWord
KillTimer
GetClipboardData
GetMenuDefaultItem
ToAsciiEx
MapVirtualKeyW
InSendMessage
GetClassInfoExA
GetDlgCtrlID
GetDlgItemTextA
EnumWindowStationsW
SetWindowsHookA
IsWindowUnicode
LoadStringA
CharNextW
CreateDialogParamA
CheckMenuItem
gdi32
PlayEnhMetaFile
CreateICA
FillPath
OffsetClipRgn
StrokePath
Rectangle
EnumMetaFile
StretchBlt
CreatePenIndirect
PlayMetaFileRecord
MoveToEx
SetWindowExtEx
SaveDC
GetDIBColorTable
AbortDoc
SetSystemPaletteUse
EndPath
SetViewportExtEx
PatBlt
GetPixelFormat
GetGlyphOutlineA
SetICMMode
GetCharacterPlacementW
SetPolyFillMode
EnumFontFamiliesA
GetKerningPairsA
CreateDIBitmap
GetWindowOrgEx
PtInRegion
CopyMetaFileW
ResetDCW
CreateFontA
comdlg32
PrintDlgW
GetSaveFileNameW
advapi32
CryptEnumProviderTypesA
IsTextUnicode
ImpersonateSelf
CryptSetProviderA
FindFirstFreeAce
GetMultipleTrusteeOperationA
RegFlushKey
GetFileSecurityA
DeleteService
MakeAbsoluteSD
GetNumberOfEventLogRecords
GetMultipleTrusteeOperationW
IsValidAcl
QueryServiceConfigW
CryptDuplicateHash
QueryServiceStatus
ObjectOpenAuditAlarmW
GetFileSecurityW
BuildImpersonateTrusteeW
GetExplicitEntriesFromAclA
AddAce
StartServiceCtrlDispatcherW
RegQueryValueExW
CreateServiceW
AllocateLocallyUniqueId
CryptSetProviderExA
GetSidLengthRequired
SetEntriesInAclW
RegSaveKeyA
GetServiceDisplayNameA
SetServiceObjectSecurity
RegisterEventSourceW
GetServiceDisplayNameW
AddAccessDeniedAce
AddAuditAccessAce
RegCreateKeyW
GetEffectiveRightsFromAclA
EqualPrefixSid
AddAccessAllowedAce
ImpersonateLoggedOnUser
GetSecurityInfo
QueryServiceConfigA
shell32
ExtractIconExA
ShellExecuteExA
ExtractAssociatedIconExA
SHGetMalloc
DragAcceptFiles
Shell_NotifyIconW
SHBrowseForFolderA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
Sections
.text Size: 282KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE