Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0834674694abd79deb8b39dac1c4f6d0_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0834674694abd79deb8b39dac1c4f6d0_JC.dll
Resource
win10v2004-20230915-en
General
-
Target
NEAS.0834674694abd79deb8b39dac1c4f6d0_JC.exe
-
Size
421KB
-
MD5
0834674694abd79deb8b39dac1c4f6d0
-
SHA1
9509303a3454289d3380bd7593752e25d7a84e22
-
SHA256
b62fb438ae2cf4d89f33422e99f0d643adf7340f72a096bc79a50180fc1f08e8
-
SHA512
70459b0d7b028d94f4ac4f99246c67cbec0931fd8509670dc96127a40488656044b2955ec987c2759629a1bb22f96ec6a0d9da96d5eee5624570104b7c9f0260
-
SSDEEP
3072:0p9S1OAFU+LXvfAJiKI0WQKpQWc4j2HtdSSk/ceE9iQUaNDJLaY6/SHjpObTli2:0DS1OMAJiKr4MSSkEeEVUQGVt
Malware Config
Signatures
Files
-
NEAS.0834674694abd79deb8b39dac1c4f6d0_JC.exe.dll windows:6 windows x86
322bcb6d240d84bd1e4b9eef8fa66c84
Code Sign
7a:d5:43:be:6b:50:64:78:bb:2e:ef:59:a0:82:30:c9Certificate
IssuerCN=DinyiAPCPGroup,1.2.840.113549.1.9.1=#0c1973746172744064696e79696170637067726f75702e6e616d65Not Before03-03-2021 00:00Not After03-03-2022 23:59SubjectCN=DinyiAPCPGroup,1.2.840.113549.1.9.1=#0c1973746172744064696e79696170637067726f75702e6e616d650d:42:4a:e0:be:3a:88:ff:60:40:21:ce:14:00:f0:ddCertificate
IssuerCN=DigiCert SHA2 Assured ID Timestamping CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01-01-2021 00:00Not After06-01-2031 00:00SubjectCN=DigiCert Timestamp 2021,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
0a:a1:25:d6:d6:32:1b:7e:41:e4:05:da:36:97:c2:15Certificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before07-01-2016 12:00Not After07-01-2031 12:00SubjectCN=DigiCert SHA2 Assured ID Timestamping CA,OU=www.digicert.com,O=DigiCert Inc,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
wininet
InternetOpenW
HttpOpenRequestA
GopherOpenFileW
FindFirstUrlCacheEntryW
InternetSetCookieA
InternetGetConnectedStateEx
InternetCloseHandle
InternetQueryOptionA
RetrieveUrlCacheEntryStreamA
kernel32
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetThreadSelectorEntry
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetEnvironmentVariableW
HeapReAlloc
CreateFileA
FindVolumeClose
SetFilePointer
SetFileBandwidthReservation
NotifyUILanguageChange
HeapAlloc
GetCommState
GetCalendarInfoEx
UpdateProcThreadAttribute
GlobalSize
HeapFree
StartThreadpoolIo
GetProcessHeap
WriteFile
EnumResourceTypesExW
WideCharToMultiByte
Sleep
EnumResourceTypesExA
GetConsoleWindow
ReleaseSemaphoreWhenCallbackReturns
HeapDestroy
GetComputerNameExA
EnumSystemCodePagesA
InitializeCriticalSectionEx
GetDynamicTimeZoneInformation
RaiseException
EnumSystemLocalesW
GetLongPathNameW
HeapSize
CreateDirectoryTransactedA
DecodePointer
ClosePrivateNamespace
GetOEMCP
ContinueDebugEvent
CancelTimerQueueTimer
VirtualProtect
DeleteCriticalSection
GetCurrentThreadId
SetFileShortNameA
ReadConsoleInputW
CloseHandle
WriteFileEx
CreateSymbolicLinkA
InterlockedPushEntrySList
GetNLSVersion
GetVolumeInformationW
SwitchToThread
GetThreadContext
VirtualQuery
GetCurrentProcess
VirtualFree
InitializeCriticalSection
LeaveCriticalSection
SetThreadPriority
EnterCriticalSection
OpenThread
GetSystemInfo
GetThreadPriority
GetCurrentProcessId
SuspendThread
ResumeThread
GetStringTypeW
RtlUnwind
SetFilePointerEx
SetStdHandle
CreateSemaphoreW
CreateFileW
GetLastError
SetEnvironmentVariableA
GetTimeZoneInformation
GetCurrentThread
SetLastError
GetCPInfo
GetACP
IsValidCodePage
GetConsoleMode
GetConsoleCP
FlushFileBuffers
FatalAppExitA
LoadLibraryExW
OutputDebugStringW
SetConsoleCtrlHandler
MultiByteToWideChar
AreFileApisANSI
ExitProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetCommandLineA
GetSystemTimeAsFileTime
EncodePointer
GetModuleHandleW
GetTickCount
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteConsoleW
GetModuleHandleExW
GetModuleFileNameW
GetFileType
GetStdHandle
QueryPerformanceCounter
GetModuleFileNameA
GetStartupInfoW
user32
InvalidateRect
VkKeyScanExA
UnregisterClassA
GetListBoxInfo
advapi32
GetFileSecurityW
RegEnumValueA
oleaut32
VarUI4FromStr
VariantChangeTypeEx
shlwapi
SHRegQueryInfoUSKeyW
PathIsUNCServerA
PathAppendA
PathCompactPathW
SHStrDupW
ord432
SHRegGetUSValueA
SHRegDuplicateHKey
ord215
PathRemoveFileSpecW
PathFindFileNameW
StrCSpnIA
SHEnumValueA
UrlApplySchemeA
PathIsUNCServerShareW
StrRChrIA
SHGetValueW
secur32
FreeContextBuffer
ChangeAccountPasswordW
imagehlp
MapFileAndCheckSumW
UnMapAndLoad
UpdateDebugInfoFile
SymGetLinePrev64
SymGetModuleBase
SymGetLineFromAddr
MapFileAndCheckSumA
SymFindFileInPathW
SymGetModuleInfoW64
oleacc
GetOleaccVersionInfo
CreateStdAccessibleProxyW
rpcrt4
I_RpcBindingHandleToAsyncHandle
version
VerFindFileW
Exports
Exports
Mon
_HookBringWindowToTop@4
_HookSetActiveWindow@4
_HookSetForegroundWindow@4
_HookSetWindowPos@28
Sections
.text Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 151KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ