Behavioral task
behavioral1
Sample
NEAS.NEASe74200fd658f9f79c34c4d0caec2543bexe_JC.exe
Resource
win7-20230831-en
General
-
Target
NEAS.NEASe74200fd658f9f79c34c4d0caec2543bexe_JC.exe
-
Size
396KB
-
MD5
e74200fd658f9f79c34c4d0caec2543b
-
SHA1
dc6e80f4ec6ed1964207ef366b9e369ad6e889c4
-
SHA256
de4912ee023b58a88307ba0032c8de7bdb7646333974007a94fbeb63199469bc
-
SHA512
0e0a650e546cfcac6af95d472df5f87c45ce7ebe968cd3c54b1a09fe08bef2987bee2c64fe11105686f7b2a517b236524178c25cdf77230d4b524087484724dd
-
SSDEEP
6144:MmQK4uSrzMUCL11g7A9lQQQlVy4J6nRe4Lfg/D2Hfd00F3bMTWwpcVpq8n:MYdSrzMZbyplVbwRe+W2HPwWwpcF
Malware Config
Signatures
-
Urelas family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.NEASe74200fd658f9f79c34c4d0caec2543bexe_JC.exe
Files
-
NEAS.NEASe74200fd658f9f79c34c4d0caec2543bexe_JC.exe.exe windows:5 windows x86
80d4e40a392b9b21c2c4e297373a5dda
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
CreateThread
GetCurrentProcessId
GetLastError
GetModuleHandleA
GetProcAddress
FreeResource
FindResourceW
LoadResource
HeapAlloc
HeapFree
GetModuleHandleW
GetProcessHeap
WriteFile
SizeofResource
GetVersionExW
ReadFile
CreateFileW
MultiByteToWideChar
GetFileSizeEx
LockResource
DeviceIoControl
GetModuleFileNameA
GetTempPathA
SetFileAttributesW
SetFilePointer
SystemTimeToFileTime
WideCharToMultiByte
GetCurrentDirectoryW
ExitProcess
SetEndOfFile
CreateFileA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
LoadLibraryA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
GetTickCount
Sleep
CreateEventW
CloseHandle
OpenEventW
DeleteFileW
GetSystemDirectoryW
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
RaiseException
GetModuleFileNameW
LocalFileTimeToFileTime
GetTempPathW
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
GetConsoleCP
GetConsoleMode
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
HeapReAlloc
GetStdHandle
user32
LoadAcceleratorsW
LoadStringW
LoadIconW
LoadCursorW
RegisterClassExW
CreateWindowExW
DialogBoxParamW
wsprintfW
SetCursorPos
SendInput
GetWindowTextW
WindowFromPoint
GetWindowRect
FindWindowW
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcW
DestroyWindow
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteA
ShellExecuteW
ws2_32
WSAStartup
send
gethostbyname
gethostbyaddr
closesocket
socket
recv
htons
WSAGetLastError
htonl
inet_addr
connect
iphlpapi
GetAdaptersAddresses
Sections
.text Size: 388KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE