Static task
static1
Behavioral task
behavioral1
Sample
NEAS.NEAS4499042716f191375f2ab9259bdda83b11640b590c241e7700f79daf45657cbcexeexe_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.NEAS4499042716f191375f2ab9259bdda83b11640b590c241e7700f79daf45657cbcexeexe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.NEAS4499042716f191375f2ab9259bdda83b11640b590c241e7700f79daf45657cbcexeexe_JC.exe
-
Size
259KB
-
MD5
2ef6f28f665d4b88e36b9de7a6c3cd36
-
SHA1
9446f629d0028a72289ba2a79b1a09885be85e99
-
SHA256
4499042716f191375f2ab9259bdda83b11640b590c241e7700f79daf45657cbc
-
SHA512
a3da67fa5810fd6ba861d23f9713030e717c49f572104d9e12d1b48b4fe8e0cca0d17dff75bec3243092cf5023c9f588f5ba6bc1a8d3e7fd5667aa8faa2913be
-
SSDEEP
3072:lgBNYKoGWDatvHmi4AMPqqwOGFGu4O+y01iuzJpKH5pv:myGWDatvHml1Podkz14Pv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.NEAS4499042716f191375f2ab9259bdda83b11640b590c241e7700f79daf45657cbcexeexe_JC.exe
Files
-
NEAS.NEAS4499042716f191375f2ab9259bdda83b11640b590c241e7700f79daf45657cbcexeexe_JC.exe.exe windows:5 windows x86
3380c2826a592a76a53bdcebd8c02436
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
WriteConsoleInputW
GetLocaleInfoA
GetConsoleAliasExesA
CommConfigDialogA
GetCPInfo
FindResourceExW
FindResourceW
WaitNamedPipeA
GetEnvironmentStringsW
GetModuleHandleExW
CreateHardLinkA
GetModuleHandleW
ConvertFiberToThread
GetCompressedFileSizeW
EnumTimeFormatsA
EnumTimeFormatsW
GetCommandLineA
GetDriveTypeA
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
CopyFileW
SetConsoleCP
GetConsoleAliasW
GetFileAttributesW
SetSystemPowerState
ReadFile
FindNextVolumeMountPointW
GetStartupInfoW
GetShortPathNameA
GetComputerNameA
GetStartupInfoA
FindFirstFileA
GetLastError
SetLastError
PeekConsoleInputW
SetVolumeLabelW
MoveFileW
EnumSystemCodePagesW
FreeUserPhysicalPages
SetComputerNameA
VerLanguageNameW
GetTempFileNameA
FindClose
CreateEventW
RemoveDirectoryW
HeapLock
GetCommMask
AddAtomA
FoldStringW
FoldStringA
FindNextFileA
SetConsoleTitleW
FindNextFileW
VirtualProtect
QueryPerformanceFrequency
OpenSemaphoreW
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
DeleteFileA
WriteConsoleW
CreateFileW
GetConsoleAliasesW
GetSystemDefaultLangID
FlushFileBuffers
SetStdHandle
WideCharToMultiByte
HeapAlloc
GetProcAddress
ExitProcess
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
EncodePointer
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetModuleFileNameW
HeapCreate
HeapFree
CloseHandle
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
user32
CharUpperW
advapi32
AbortSystemShutdownW
shell32
DragAcceptFiles
Sections
.text Size: 223KB - Virtual size: 222KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ