Static task
static1
Behavioral task
behavioral1
Sample
NEAS.62c2061f6808cc731d30a5706461c710_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.62c2061f6808cc731d30a5706461c710_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.62c2061f6808cc731d30a5706461c710_JC.exe
-
Size
132KB
-
MD5
62c2061f6808cc731d30a5706461c710
-
SHA1
7ac1cc03a6c5b76ea616551a8794242483eacde9
-
SHA256
753ef678f62d7a027853283f7a2a7b23ca80853862f323913ede6def51827ecf
-
SHA512
8df9f8723e7aaffa381a15f33c66df689be6f510f68a5f28875e45061bc600b1162c72a806ebcea6509018ee99c6ed5036485633f097888ec02b3156b19cc7f9
-
SSDEEP
3072:rujP+dV6bBYwz0MyNWw7ckX1JaoXrZ0itW5G:ijWV0BMpNprSit
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.62c2061f6808cc731d30a5706461c710_JC.exe
Files
-
NEAS.62c2061f6808cc731d30a5706461c710_JC.exe.exe windows:4 windows x86
6e502c55f3c4ba888efda49c663c57a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
CreateFileA
GetCurrentProcess
WriteFile
SetFilePointer
FindClose
SetErrorMode
ReadFile
GetVersionExA
CreateDirectoryA
GetSystemDirectoryA
GetFileSize
OpenEventA
GetACP
SetStdHandle
IsBadCodePtr
IsBadReadPtr
FlushFileBuffers
GetStringTypeW
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
HeapSize
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetCPInfo
LCMapStringW
LCMapStringA
HeapReAlloc
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
RaiseException
HeapFree
RtlUnwind
HeapAlloc
CreateEventA
LoadLibraryA
GetProcAddress
GetShortPathNameA
GetTickCount
TerminateProcess
WaitForSingleObject
MulDiv
Sleep
GetCurrentThreadId
CreateProcessA
CloseHandle
WaitForMultipleObjects
GetModuleHandleA
FindResourceA
SizeofResource
GetLastError
FindFirstFileA
GetLocaleInfoA
GetOEMCP
SetEndOfFile
GetLocaleInfoW
user32
GetSystemMetrics
CopyRect
EnumWindows
SendMessageTimeoutA
GetClassNameA
SetActiveWindow
SetForegroundWindow
IsWindow
IsWindowVisible
OffsetRect
GetWindowRect
RegisterClassA
GetDesktopWindow
RegisterWindowMessageA
CreateWindowExA
SetWindowLongA
SetWindowRgn
ShowWindow
UpdateWindow
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
DefWindowProcA
PostThreadMessageA
BeginPaint
InflateRect
DrawTextA
EndPaint
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
LoadStringA
SetWindowPos
GetWindowTextA
LoadCursorA
LoadIconA
gdi32
CreateRoundRectRgn
CreateCompatibleDC
SelectObject
RoundRect
GetStockObject
DeleteDC
CreatePen
SetBkMode
SetTextColor
CreateFontIndirectA
GetObjectA
GetDeviceCaps
DeleteObject
BitBlt
advapi32
GetUserNameA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ