Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEASNEASc78fdf1284c80f1d2822e9f53f85c116e080871086bae22c632f9e6a3786e4a5exeexeexe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.NEASNEASc78fdf1284c80f1d2822e9f53f85c116e080871086bae22c632f9e6a3786e4a5exeexeexe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.NEASNEASc78fdf1284c80f1d2822e9f53f85c116e080871086bae22c632f9e6a3786e4a5exeexeexe_JC.exe
-
Size
265KB
-
MD5
d8e2d4ee9ea649e6c59ed61bf899400e
-
SHA1
b9a5245c0001c8fea8da2e716120a5cc93b10e6a
-
SHA256
c78fdf1284c80f1d2822e9f53f85c116e080871086bae22c632f9e6a3786e4a5
-
SHA512
999f99378b3a277ca6bf54f4211862b519104aaf729de8d8dad692c1a9d48561b25ce5782d970c1bf10ce814ee7787ed5a116d019b3470b74a7b2110015f1485
-
SSDEEP
3072:QBNZOh4l8XCkzBQhqJQVjBFgbZzxQqhlO6DMNWTsUS1n:4ih4l8XCk1R0XgbZznoYMUX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.NEASNEASc78fdf1284c80f1d2822e9f53f85c116e080871086bae22c632f9e6a3786e4a5exeexeexe_JC.exe
Files
-
NEAS.NEASNEASc78fdf1284c80f1d2822e9f53f85c116e080871086bae22c632f9e6a3786e4a5exeexeexe_JC.exe.exe windows:5 windows x86
9df65c1e3a74f1cea47f66f8b82d9382
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeLabelA
SetDefaultCommConfigA
GetConsoleAliasesLengthW
GetLocaleInfoA
GetConsoleAliasExesA
CommConfigDialogA
FindResourceW
MapUserPhysicalPages
OpenJobObjectA
ReadConsoleA
InterlockedDecrement
QueryPerformanceCounter
GetEnvironmentStringsW
GetModuleHandleExW
WriteConsoleInputA
SetComputerNameW
FreeEnvironmentStringsA
SetThreadUILanguage
FindNextVolumeMountPointA
ConvertFiberToThread
GetWindowsDirectoryA
GetCompressedFileSizeW
WaitNamedPipeW
EnumTimeFormatsA
WriteFile
GetCommandLineA
GetDriveTypeA
GetEnvironmentStrings
FindResourceExA
GetConsoleCP
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
DeleteVolumeMountPointW
EnumSystemCodePagesA
GetFileAttributesW
SetSystemPowerState
GetComputerNameA
CreateFileW
GetACP
GetVolumePathNameA
GetStartupInfoW
GetNamedPipeHandleStateW
GetConsoleAliasesW
FindFirstFileA
GetLastError
SetLastError
PeekConsoleInputW
HeapUnlock
MoveFileW
CopyFileA
GetTempFileNameA
FindClose
LoadLibraryA
LocalAlloc
BuildCommDCBAndTimeoutsW
CreateHardLinkW
RemoveDirectoryW
AddAtomA
SetCommMask
GetTapeParameters
FoldStringW
GetPrivateProfileSectionNamesA
FindNextFileA
GetModuleHandleA
GetStringTypeW
GetConsoleTitleW
VirtualProtect
FatalAppExitA
GetShortPathNameW
SetCalendarInfoA
OpenSemaphoreW
FindFirstVolumeW
ReadConsoleOutputCharacterW
DeleteFileA
FlushFileBuffers
SetStdHandle
GetAtomNameW
GetVolumeNameForVolumeMountPointA
MoveFileA
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WideCharToMultiByte
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetOEMCP
IsValidCodePage
CloseHandle
FreeEnvironmentStringsW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
RaiseException
WriteConsoleW
user32
CharUpperBuffA
CharUpperW
gdi32
GetTextFaceA
winhttp
WinHttpReadData
Sections
.text Size: 218KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bivahu Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wevanev Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ