Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0140d85aa8de034eb7e18e7e5a45cae0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0140d85aa8de034eb7e18e7e5a45cae0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.0140d85aa8de034eb7e18e7e5a45cae0_JC.exe
-
Size
8.7MB
-
MD5
0140d85aa8de034eb7e18e7e5a45cae0
-
SHA1
d47970ef90418db9e88d6f4ba73159f870974c34
-
SHA256
dbff027174453923599b1f9c03f4f914a64ee0e1fc6bb147720659191ed12944
-
SHA512
0ae0acb2083d8e425e74c7d56a9a6e08f65ab65ef06525f1abf45311d89c2cf9ddbdfaf1e7dc54939adf2264eef99ba820bed0ac06d68635893eed4405186d9a
-
SSDEEP
196608:/+FSGnNhdXOzUh8949v2rUIEVFu4vA8OenqULWoORQzjnf:/DGN7CUT9uSVFu4ZSoORQzT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.0140d85aa8de034eb7e18e7e5a45cae0_JC.exe
Files
-
NEAS.0140d85aa8de034eb7e18e7e5a45cae0_JC.exe.exe windows:4 windows x86
6ff17e15b4dd569b039973ccf414da18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharPrevA
CharUpperW
CharNextA
CharUpperA
oleaut32
SysStringByteLen
VariantCopy
VariantClear
SysFreeString
SysAllocString
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
fprintf
memset
memcpy
fputc
fputs
fflush
fgetc
fclose
_iob
free
malloc
memmove
strlen
memcmp
_purecall
__CxxFrameHandler
_CxxThrowException
_isatty
_fileno
kernel32
VirtualAlloc
GetTickCount
VirtualFree
WaitForSingleObject
SetEvent
InitializeCriticalSection
OpenFileMappingA
GetProcessTimes
LocalFree
MapViewOfFile
UnmapViewOfFile
OpenEventA
GetStdHandle
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetCurrentProcess
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
GetFileSize
CreateFileA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
SearchPathW
SearchPathA
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryExA
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
GetCurrentDirectoryW
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesA
RemoveDirectoryA
MoveFileA
SetFileAttributesW
RemoveDirectoryW
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
SetCurrentDirectoryW
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 784B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ