Static task
static1
Behavioral task
behavioral1
Sample
NEAS.181f7011138303569d8487474be57860_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.181f7011138303569d8487474be57860_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.181f7011138303569d8487474be57860_JC.exe
-
Size
1.7MB
-
MD5
181f7011138303569d8487474be57860
-
SHA1
096301261586b549476df81c0d1afa3ac665c64d
-
SHA256
6d91745054785366e76ace23904080313e9993f04c1bbe58004e85e3bf1aa208
-
SHA512
b7da3ed89c76dd729be4837bbdde2f41d9c012753be790911a359dcdfb8a5e21636ec2aa106296393278e5dbf08c58cdcdd839f33c5cc839113318fbf4be52e7
-
SSDEEP
49152:yJHyPkyQv2myIG5fzDTpt+xjQtV8ahOq21CxTFT4:2lJip1sxU2CBFT4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.181f7011138303569d8487474be57860_JC.exe
Files
-
NEAS.181f7011138303569d8487474be57860_JC.exe.exe windows:5 windows x64
6b89f79ae7e559dcc29305e333feb674
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetCurrentProcess
VirtualAlloc
TerminateProcess
GetProcessId
WaitForSingleObject
GetModuleHandleA
OpenProcess
CreateToolhelp32Snapshot
QueryFullProcessImageNameA
CreateFileA
Process32Next
CloseHandle
GetProcAddress
VirtualFree
WriteProcessMemory
HeapFree
InitializeProcThreadAttributeList
DuplicateHandle
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
HeapAlloc
VirtualAllocEx
GetProcessHeap
VirtualFreeEx
HeapSize
ReadConsoleW
WriteConsoleW
Process32First
ReadFile
GetLastError
Sleep
GetFileSize
GetModuleFileNameA
SetStdHandle
SetEnvironmentVariableA
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
DecodePointer
MultiByteToWideChar
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetCPInfo
SetEvent
ResetEvent
WaitForSingleObjectEx
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
FreeLibrary
LoadLibraryExW
HeapReAlloc
GetStdHandle
WriteFile
ExitProcess
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
user32
FindWindowA
advapi32
DuplicateTokenEx
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CreateProcessAsUserA
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xuxu0 Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xuxu1 Size: 428KB - Virtual size: 428KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 480B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE