Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.195b3a8be999f8d3f6900e1e870338a0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.195b3a8be999f8d3f6900e1e870338a0_JC.exe
Resource
win10v2004-20230915-en
Target
NEAS.195b3a8be999f8d3f6900e1e870338a0_JC.exe
Size
569KB
MD5
195b3a8be999f8d3f6900e1e870338a0
SHA1
235252dfcc093a59f21f416b7e6214f245d5ca7e
SHA256
5521918aa97ce1f982cf154c610160979765bab723fe4f6ac3d889bd808ea443
SHA512
f34903fb63a5cc124f63b46489594cfe5e173072dd9a3917c51c00e10c9cbdfd8f7835ed7a2e7f5dca957416aadbd787da0f4ea8d98fdbc1f4dd914646e53ecc
SSDEEP
12288:OUK9i083q5iHKa+rtsq/3f2foD2tYY5X7Cf5TB2CIH+cR+2qN:mi0gqMKxyWfdD2mYV7Cf5TB2nHHU2qN
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LocalAlloc
LoadLibraryA
CreateEventW
CreateFileW
WriteFile
SetFilePointerEx
ResetEvent
CreateDirectoryW
GetCommandLineW
GetCurrentProcessId
GetCurrentDirectoryW
SetCurrentDirectoryW
MapViewOfFile
VirtualQuery
UnmapViewOfFile
GetExitCodeProcess
GlobalFree
lstrcpynW
lstrcmpA
lstrcmpW
FindClose
GetFullPathNameW
FindFirstFileW
FindNextFileW
DebugBreak
OutputDebugStringW
lstrlenA
LoadLibraryW
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
FlushFileBuffers
CloseHandle
ReadFile
WriteConsoleW
SetStdHandle
LCMapStringW
InterlockedIncrement
GetConsoleCP
WideCharToMultiByte
SetFilePointer
RtlUnwind
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
HeapReAlloc
HeapCreate
ExitProcess
HeapSize
Sleep
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
lstrlenW
InterlockedDecrement
GetModuleFileNameW
LoadLibraryExW
FindResourceW
LoadResource
SizeofResource
MultiByteToWideChar
lstrcmpiW
FreeLibrary
SetLastError
GetLastError
RaiseException
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
GetModuleHandleW
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
GetConsoleMode
HeapFree
InterlockedPushEntrySList
InterlockedCompareExchange
LoadCursorW
SetTimer
KillTimer
DestroyWindow
CreateWindowExW
RegisterClassExW
GetClassInfoExW
DefWindowProcW
GetWindowLongW
SetWindowLongW
InvalidateRect
RegisterWindowMessageW
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetDlgItem
GetClassNameW
GetSysColor
RedrawWindow
CreateAcceleratorTableW
UnregisterClassA
GetDesktopWindow
GetFocus
UpdateWindow
SetWindowTextW
GetWindowTextW
GetWindowTextLengthW
SendMessageW
ClientToScreen
ReleaseDC
GetDC
PostMessageW
ShowWindow
IsWindowVisible
MonitorFromWindow
GetMonitorInfoW
GetParent
GetClientRect
MapWindowPoints
SetWindowPos
MoveWindow
GetWindowRect
IsWindow
GetWindow
LoadImageW
PostThreadMessageW
SendMessageTimeoutW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
CharNextW
CallWindowProcW
CreateSolidBrush
GetStockObject
GetDeviceCaps
GetObjectW
SelectObject
CreateCompatibleDC
DeleteDC
DeleteObject
GetSaveFileNameW
RegQueryInfoKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
SHGetFolderPathW
CoCreateInstance
OleInitialize
CreateStreamOnHGlobal
OleLockRunning
OleUninitialize
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
SysStringLen
VariantCopy
OleCreateFontIndirect
DispCallFunc
VarBstrCat
SysStringByteLen
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
VariantInit
VariantClear
VariantChangeType
SysAllocString
VarUI4FromStr
PathIsDirectoryW
PathFileExistsW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ