Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0e62d7528876ab64e5e695e1d8086300_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0e62d7528876ab64e5e695e1d8086300_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.0e62d7528876ab64e5e695e1d8086300_JC.exe
-
Size
13KB
-
MD5
0e62d7528876ab64e5e695e1d8086300
-
SHA1
9bfb9819c94a376f33a1e2137af73e71a75235fe
-
SHA256
1e52acd8da622ab5bc22518c5f4b23b5e0907364b40f152fc9cf935fe7f433d1
-
SHA512
7cd5e6dde41f31df53f2d7237f2925953fbc6993847353131578d82912310abfe6b8daba2322a9d959fee48d52afc20543063269025cc19acb9dacf7cac91a26
-
SSDEEP
192:Tt81WWA56wFr8f+k/fJ4w8mEF1D0xUahlxC/i61+vFAZRQhbjpBKzp1mhEgU3Cz:TGUBMb3Sw8HFSOanxF6YvqAHB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.0e62d7528876ab64e5e695e1d8086300_JC.exe
Files
-
NEAS.0e62d7528876ab64e5e695e1d8086300_JC.exe.exe windows:4 windows x86
94e541fca6528c626b3081ed7afe277b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryA
WaitForSingleObject
CreateThread
CreateMutexA
GetVersionExA
lstrcmpiA
lstrcatA
DeleteFileA
lstrcpyA
GetTempFileNameA
GetTempPathA
Sleep
WinExec
lstrlenA
GetTickCount
ReadFile
SetFilePointer
CreateFileA
WriteFile
CloseHandle
GetCurrentProcess
GetSystemDirectoryA
user32
FindWindowA
wsprintfA
advapi32
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
RegSetValueExA
RegCreateKeyA
RegCloseKey
wininet
InternetReadFile
InternetCloseHandle
DeleteUrlCacheEntry
InternetOpenUrlA
InternetOpenA
msvcp60
??1_Winit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
shell32
ShellExecuteA
msvcrt
strcat
__CxxFrameHandler
_itoa
_except_handler3
_onexit
__dllonexit
sprintf
strcpy
strlen
memcpy
memset
malloc
strchr
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls0 Size: 1024B - Virtual size: 943B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.reloc Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ