Behavioral task
behavioral1
Sample
NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe
-
Size
392KB
-
MD5
a9ee5717f9ed4aa52358a2dce5cd24e6
-
SHA1
fb07be112019076233e0012986e97738c06b9ea4
-
SHA256
984d9cf4b34ed3602c3773af5aa6634f0fde8f5014412ff69064f40b53ca86e4
-
SHA512
ace8009bb0a17385a51ec52e83f72edb1551a29a7c76c9c921d1e05ad75315318d66becf96111d4cc6ac12e78caa9090a05b3a416fcbd5ea3badeb9565ba75ab
-
SSDEEP
12288:fEOZQtZVa6JdD/lHoOMzXCGOoIVdDHMxj:fE1HVa2dDNIrrCGOoQDAj
Malware Config
Signatures
-
Urelas family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe
Files
-
NEAS.NEASa9ee5717f9ed4aa52358a2dce5cd24e6exe_JC.exe.exe windows:5 windows x86
991c5a72122a41ebafc53117f57e5c77
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
GetCurrentProcessId
GetLastError
GetModuleHandleA
GetProcAddress
FreeResource
FindResourceW
LoadResource
HeapAlloc
HeapFree
GetModuleHandleW
GetProcessHeap
WriteFile
GetSystemDirectoryW
SizeofResource
GetVersionExW
ReadFile
CreateFileW
MultiByteToWideChar
GetFileSizeEx
LockResource
DeviceIoControl
GetModuleFileNameA
GetTempPathA
SetFileAttributesW
SetFilePointer
SystemTimeToFileTime
WideCharToMultiByte
GetCurrentDirectoryW
GetModuleFileNameW
SetEndOfFile
CreateFileA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
HeapSize
LoadLibraryA
CreateThread
CreateEventW
CloseHandle
GetFileAttributesW
GetTickCount
ExitProcess
Sleep
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetTempPathW
LocalFileTimeToFileTime
OpenEventW
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetStdHandle
RaiseException
RtlUnwind
GetConsoleCP
user32
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
LoadAcceleratorsW
LoadCursorW
RegisterClassExW
CreateWindowExW
DialogBoxParamW
DestroyWindow
LoadStringW
LoadIconW
wsprintfW
SetCursorPos
SendInput
GetWindowTextW
WindowFromPoint
GetWindowRect
FindWindowW
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
shell32
ShellExecuteA
ShellExecuteW
ws2_32
WSAStartup
send
gethostbyname
gethostbyaddr
closesocket
socket
recv
htons
WSAGetLastError
htonl
inet_addr
connect
iphlpapi
GetAdaptersAddresses
Sections
.text Size: 384KB - Virtual size: 388KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE