LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1a03065d33eb97a56e6f59c883c35e60_JC.dll
Resource
win7-20230831-en
Target
NEAS.1a03065d33eb97a56e6f59c883c35e60_JC.exe
Size
235KB
MD5
1a03065d33eb97a56e6f59c883c35e60
SHA1
b29dad06dcf5adec1eff06ab5058469bed186017
SHA256
97b639b58ef4186d74f0e8c79665f0dd650e8f7bfb824fd281311894c16229c3
SHA512
18611efeb7fcd5c4ab5f76440fc93d5c6f31c3ec1b660a5017b722b4bd8012cec5a3517d9ab2b9198b7b0216ec4cf45c1991b45c3f52d6d19b889d9dc86bfb60
SSDEEP
6144:6v8LGyH7uG/NV2Hm+8Nj7J1hH1RhC+R5F:6v8Krb8NjF5R5F
Checks for missing Authenticode signature.
resource |
---|
NEAS.1a03065d33eb97a56e6f59c883c35e60_JC.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitProcess
GetProcAddress
RtlMoveMemory
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
RtlZeroMemory
CloseHandle
WriteFile
CreateFileA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
GetTickCount
GetLogicalDrives
FindClose
FindNextFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
FindFirstFileA
lstrcpyA
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
FreeLibrary
SetEvent
CreateEventA
DisableThreadLibraryCalls
LoadLibraryA
lstrcatA
GetSystemDirectoryA
ord64
PathFindExtensionA
PathAppendA
PathFindFileNameA
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE