DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.0648b14c066a3f06970b4707c09df7f0_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.0648b14c066a3f06970b4707c09df7f0_JC.dll
Resource
win10v2004-20230915-en
Target
NEAS.0648b14c066a3f06970b4707c09df7f0_JC.exe
Size
524KB
MD5
0648b14c066a3f06970b4707c09df7f0
SHA1
bea9f05beafcf81ca4bbf66505e8464b1bc5306d
SHA256
b3947b7457f28aa7388d4b16834b4fbdf9bdd5a223c61fe90f31bcf188bd03ce
SHA512
52d66be523be051975c5086559c9599f63c400af17734bcaf2d53bb4b7d5f06e4c5b674b3db90ccfd90dff682c0e9303d69a6d873ac29a53597edfb1019b4ba9
SSDEEP
6144:y+dNe6CBlOIxoHPb59NjJWAEnMsUKedadY6cQ7FIne94HxTZ/bQBX0vQk4:ndNjAM6ovb5LsLBHedH6r7FuZx9QxH
Checks for missing Authenticode signature.
resource |
---|
NEAS.0648b14c066a3f06970b4707c09df7f0_JC.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTempPathW
TerminateProcess
OpenProcess
CopyFileW
WideCharToMultiByte
InitializeCriticalSection
FindResourceExW
LockResource
GlobalReAlloc
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
IsDebuggerPresent
OutputDebugStringW
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
SetFileAttributesW
DeleteFileW
LocalFree
lstrlenA
SetEnvironmentVariableA
FlushFileBuffers
WriteConsoleW
ReadConsoleW
SetEndOfFile
GetTimeZoneInformation
SetStdHandle
GetStringTypeW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
CompareStringW
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileType
GetFileInformationByHandle
FileTimeToLocalFileTime
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
Sleep
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WriteFile
GetStdHandle
GetModuleHandleExW
ExitProcess
ReadFile
GetFileSize
CreateFileW
SetThreadLocale
GetThreadLocale
EncodePointer
FindResourceW
lstrcmpiW
SizeofResource
LoadResource
LoadLibraryExW
GetProcAddress
GetModuleHandleW
FreeLibrary
MultiByteToWideChar
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GetCommandLineA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
GetFileAttributesExW
VirtualQuery
VirtualProtect
GetSystemInfo
RtlUnwind
GlobalAlloc
FlushInstructionCache
GetCurrentThreadId
GetCurrentProcess
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSectionEx
LeaveCriticalSection
EnterCriticalSection
GetLastError
RaiseException
DecodePointer
FillRect
SendMessageW
UnregisterClassW
CharLowerBuffW
RegisterWindowMessageW
PostMessageW
DefWindowProcW
CallWindowProcW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
IsWindow
IsChild
DestroyWindow
MoveWindow
SetWindowPos
GetDlgItem
CharNextW
SetFocus
GetFocus
SetCapture
GetWindowThreadProcessId
PeekMessageW
SetParent
ShowWindow
FindWindowW
IsClipboardFormatAvailable
ReleaseCapture
GetClipboardData
CloseClipboard
OpenClipboard
LoadCursorW
GetWindow
GetClassNameW
GetParent
GetDesktopWindow
SetWindowLongW
GetWindowLongW
OffsetRect
EmptyClipboard
GetSysColor
ScreenToClient
ClientToScreen
GetWindowRect
GetClientRect
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
RedrawWindow
InvalidateRgn
InvalidateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
DestroyAcceleratorTable
CreateAcceleratorTableW
KillTimer
SetTimer
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegSetValueExW
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetKeyParam
CryptGetHashParam
CryptImportKey
CryptDecrypt
CryptCreateHash
CryptHashData
CryptDestroyHash
RegCloseKey
CreateStreamOnHGlobal
CoGetClassObject
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
StringFromGUID2
CoTaskMemAlloc
CoTaskMemFree
CreateBindCtx
OleInitialize
OleUninitialize
CoTaskMemRealloc
HWND_UserFree
HWND_UserUnmarshal
HWND_UserMarshal
HWND_UserSize
OleLockRunning
OleDraw
SHGetDesktopFolder
VARIANT_UserSize
VARIANT_UserMarshal
VARIANT_UserUnmarshal
VARIANT_UserFree
LPSAFEARRAY_UserSize
LPSAFEARRAY_UserMarshal
LPSAFEARRAY_UserUnmarshal
LPSAFEARRAY_UserFree
VarUI4FromStr
SysStringByteLen
SysAllocStringByteLen
SafeArrayCreate
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayLock
VariantCopy
RegisterTypeLi
UnRegisterTypeLi
OleLoadPicture
SafeArrayDestroy
SafeArrayUnlock
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayRedim
SafeArrayCopy
SafeArrayGetVartype
VariantChangeType
VarI4FromStr
VarBstrFromI4
VariantClear
VariantInit
SysAllocStringLen
VarBstrCmp
SysAllocString
LoadRegTypeLi
LoadTypeLi
SysStringLen
SysFreeString
OleCreateFontIndirect
SetEnhMetaFileBits
GetDIBits
PlayEnhMetaFile
GetEnhMetaFileHeader
GetEnhMetaFileW
DeleteEnhMetaFile
CreateDIBSection
CopyEnhMetaFileW
StretchBlt
SelectObject
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
SetBrushOrgEx
BitBlt
SetStretchBltMode
GetObjectW
CreateURLMonikerEx
CoInternetSetFeatureEnabled
IUnknown_AddRef_Proxy
NdrOleAllocate
UuidToStringW
UuidCreate
RpcStringFreeW
NdrDllUnregisterProxy
NdrDllRegisterProxy
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrCStdStubBuffer_Release
NdrClientCall2
IUnknown_QueryInterface_Proxy
NdrOleFree
IUnknown_Release_Proxy
CStdStubBuffer_QueryInterface
CStdStubBuffer_AddRef
CStdStubBuffer_Connect
CStdStubBuffer_Disconnect
CStdStubBuffer_Invoke
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_CountRefs
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_DebugServerRelease
DllCanUnloadNow
DllGetClassObject
DllInstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ