Static task
static1
Behavioral task
behavioral1
Sample
NEAS.824b5418ef55c56a9badc6a61d2ec860_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.824b5418ef55c56a9badc6a61d2ec860_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.824b5418ef55c56a9badc6a61d2ec860_JC.exe
-
Size
956KB
-
MD5
824b5418ef55c56a9badc6a61d2ec860
-
SHA1
2257e33fc223ef6d81c59b8d6f9fadfb07683a21
-
SHA256
5573916d2e4b5bad8d5764d208561ebc929c25c75d26c5db20e5e51353952857
-
SHA512
3298cd211615b3b76ebd1b9f66919e70d4fb5226d0657e35d7a22811cc4442b970f49c8577795d3ead371ae09c3436e66fa9fb9486061f95b1eae0961ed1cc4b
-
SSDEEP
24576:pzcRt7HTQyjzXfXn6ttg+x1ePvsgIT/IcjJn80yDvNQany:p6z9PveTHqN4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.824b5418ef55c56a9badc6a61d2ec860_JC.exe
Files
-
NEAS.824b5418ef55c56a9badc6a61d2ec860_JC.exe.exe windows:4 windows x86
849a7b3f2c64f7dd6c1db2b12d74b9be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetProcAddress
GetLastError
GetLocaleInfoA
GetModuleHandleA
Sleep
CreateMutexA
CloseHandle
OpenMutexA
GetVersionExA
ExitProcess
lstrlenA
LoadLibraryA
CreateDirectoryA
LocalAlloc
DeleteFileA
GetModuleFileNameA
GetCurrentThreadId
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
GlobalAlloc
GlobalLock
GlobalUnlock
GetSystemDirectoryA
GetStartupInfoA
LocalFree
WideCharToMultiByte
user32
CloseClipboard
SetClipboardData
MessageBoxA
OpenClipboard
GetDesktopWindow
GetClipboardData
EmptyClipboard
GetWindowRect
EnumWindows
GetWindowTextA
SystemParametersInfoA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
LoadIconA
RegisterClassExA
CreateWindowExA
AdjustWindowRectEx
MoveWindow
SetForegroundWindow
ShowWindow
UpdateWindow
DialogBoxParamA
PostQuitMessage
ValidateRect
DefWindowProcA
GetSystemMetrics
SetCursor
LoadCursorA
SetDlgItemTextA
SetWindowTextA
GetDlgItem
SetFocus
GetDlgItemTextA
EndDialog
IsClipboardFormatAvailable
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
FreeSid
shell32
ShellExecuteA
DragQueryPoint
DragAcceptFiles
DragQueryFileA
SHGetFolderPathA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantInit
VariantClear
SysStringLen
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
msvcrt
__set_app_type
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
atol
strncpy
qsort
putc
localtime
_findfirst
_findnext
_findclose
strrchr
_setjmp3
longjmp
_CIpow
floor
memchr
_controlfp
_stricmp
__p__fmode
_iob
fflush
fwrite
time
fseek
ftell
fread
printf
strncmp
fopen
fprintf
fclose
_purecall
rand
isdigit
isalpha
atof
sprintf
tolower
??3@YAXPAX@Z
??2@YAPAXI@Z
free
malloc
__CxxFrameHandler
exit
_vsnprintf
memmove
_snprintf
strstr
strchr
realloc
_ftol
atoi
winmm
timeBeginPeriod
timeGetTime
ws2_32
recv
send
connect
gethostbyname
htons
WSAStartup
socket
netapi32
Netbios
Sections
.text Size: 640KB - Virtual size: 638KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 385KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ