CanOfferReactivation
CanOfferRelaunch
GetHandleVerifier
GoogleChromeCompatibilityCheck
GoogleChromeDaysSinceLastRun
LaunchGoogleChrome
LaunchGoogleChromeInBackground
LaunchGoogleChromeWithDimensions
ReactivateChrome
SetRelaunchOffered
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1777f08c4dbca7859b1ff08a357c7ac0_JC.dll
Resource
win7-20230831-en
Target
NEAS.1777f08c4dbca7859b1ff08a357c7ac0_JC.exe
Size
532KB
MD5
1777f08c4dbca7859b1ff08a357c7ac0
SHA1
9e844453aded7a6604b6acc9f38ce7b74186875c
SHA256
098add9ba3661e494608b81706cadcd87465249be08b35299624e344aac303ec
SHA512
31b64aede9259945356da5726c31878f3edad200e7f79a4771cf73f1322bbff3b39a43e05ac20beb6910fc30bd1120066708d7f7f18bad04da945acea8e06fb2
SSDEEP
12288:Rd+LZrNwWrrwMNoz4vG1OYZabtK75W9y/7ikdjgEb:RYLZreWXvyPabI7AsiYj3b
Checks for missing Authenticode signature.
resource |
---|
NEAS.1777f08c4dbca7859b1ff08a357c7ac0_JC.exe |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
timeGetTime
GetCommandLineW
LocalFree
IsDebuggerPresent
GetCurrentProcess
WaitForSingleObject
GetCurrentThreadId
Sleep
RaiseException
CreateDirectoryW
ReadFile
GetTempPathW
GetFileAttributesW
GetCurrentDirectoryW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
GetModuleHandleExW
GetProcAddress
GetModuleHandleW
GetVersionExW
GetNativeSystemInfo
TzSpecificLocalTimeToSystemTime
FileTimeToSystemTime
QueryPerformanceFrequency
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetEndOfFile
SetFilePointerEx
FlushFileBuffers
GetTickCount
FindClose
TlsSetValue
TlsAlloc
TlsGetValue
TlsFree
RtlCaptureStackBackTrace
SetUnhandledExceptionFilter
ExpandEnvironmentStringsW
VirtualQuery
GetSystemInfo
HeapAlloc
HeapReAlloc
HeapFree
OpenProcess
FindResourceW
SetHandleInformation
HeapSize
ReadConsoleW
UnlockFileEx
LockFileEx
GetWindowsDirectoryW
GetSystemDirectoryW
GetUserDefaultUILanguage
GetEnvironmentVariableW
CreateProcessW
ResumeThread
AssignProcessToJobObject
FormatMessageA
GetCurrentProcessId
CloseHandle
DeleteFileW
GetLastError
CreateFileW
GetModuleFileNameW
OutputDebugStringA
WriteFile
SetLastError
GetLocalTime
lstrlenW
LoadResource
LockResource
VirtualProtect
FreeLibrary
LoadLibraryExA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
MultiByteToWideChar
InitializeCriticalSectionAndSpinCount
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
RtlUnwind
InterlockedFlushSList
LoadLibraryExW
GetConsoleCP
GetConsoleMode
ExitProcess
GetFullPathNameW
SetStdHandle
GetFileType
GetProcessHeap
GetModuleFileNameA
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetTimeZoneInformation
GetACP
WriteConsoleW
GetDriveTypeW
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetEnvironmentVariableW
OutputDebugStringW
SizeofResource
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
CoInitializeEx
CoTaskMemFree
CharUpperW
SetWindowPos
GetShellWindow
EnumWindows
GetClassNameW
GetWindowThreadProcessId
CreateProcessAsUserW
ConvertSidToStringSidW
RevertToSelf
ImpersonateLoggedOnUser
GetTokenInformation
FreeSid
SystemFunction036
DuplicateTokenEx
CheckTokenMembership
AllocateAndInitializeSid
OpenProcessToken
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
CreateEnvironmentBlock
DestroyEnvironmentBlock
SysAllocString
SysFreeString
VariantClear
UuidCreate
CanOfferReactivation
CanOfferRelaunch
GetHandleVerifier
GoogleChromeCompatibilityCheck
GoogleChromeDaysSinceLastRun
LaunchGoogleChrome
LaunchGoogleChromeInBackground
LaunchGoogleChromeWithDimensions
ReactivateChrome
SetRelaunchOffered
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE