?RunDrawing@@YAXPAXJPADVCString@@@Z
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.272b8de0e5b0d5ee3fc98f961fce9b00_JC.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.272b8de0e5b0d5ee3fc98f961fce9b00_JC.dll
Resource
win10v2004-20231020-en
General
-
Target
NEAS.272b8de0e5b0d5ee3fc98f961fce9b00_JC.exe
-
Size
265KB
-
MD5
272b8de0e5b0d5ee3fc98f961fce9b00
-
SHA1
e1650017f6be3d55d31fafa6147274c25cdd4a97
-
SHA256
238e5c9f00bf3d56b7e22552570270e77c2167c81be9c31699b9a9ec5d30cb05
-
SHA512
1a087ab899ef082a02f1e81b67b4d77a297c9a6545a810d28cfc85c308ff9336750bd5f709d7c15f44dbf221aec9ba985780b3ef06776fe9524f1cb06f41e02d
-
SSDEEP
6144:8JLxRPYDA8Mu1kI5t8qilxQoPnZZEZAj87BxfDUTEv1H2c:2Lxuh1kIynxQoPEn7B5DUUWc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.272b8de0e5b0d5ee3fc98f961fce9b00_JC.exe
Files
-
NEAS.272b8de0e5b0d5ee3fc98f961fce9b00_JC.exe.dll windows:4 windows x86
e5d46e6367635fa473942aaa8412212d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mfc42
ord4976
ord4948
ord4358
ord5265
ord4377
ord4854
ord4998
ord2514
ord6052
ord1775
ord5287
ord4835
ord4441
ord2055
ord4425
ord768
ord489
ord2302
ord4258
ord2642
ord4710
ord3663
ord4133
ord4297
ord1641
ord2414
ord5788
ord5787
ord1871
ord6571
ord3693
ord3626
ord4204
ord858
ord5821
ord3662
ord414
ord713
ord6141
ord5859
ord772
ord500
ord6142
ord5860
ord4376
ord4853
ord5280
ord3597
ord641
ord324
ord2370
ord4234
ord3874
ord5981
ord2614
ord6199
ord939
ord924
ord941
ord287
ord610
ord6139
ord5857
ord5450
ord6394
ord5440
ord6383
ord5290
ord3402
ord4424
ord3610
ord656
ord567
ord3706
ord537
ord1858
ord4245
ord5101
ord2101
ord2723
ord2390
ord3059
ord5100
ord5104
ord4467
ord4303
ord3351
ord5012
ord976
ord5472
ord3403
ord2879
ord2878
ord4077
ord5237
ord2382
ord5283
ord2649
ord1665
ord4436
ord5254
ord2445
ord4427
ord401
ord674
ord2639
ord4458
ord4152
ord2864
ord2582
ord4402
ord3370
ord3640
ord693
ord384
ord686
ord2301
ord2915
ord3998
ord2862
ord3996
ord2096
ord6453
ord940
ord3573
ord6170
ord5875
ord1200
ord3619
ord4129
ord5683
ord5710
ord2763
ord2764
ord5572
ord1816
ord554
ord326
ord807
ord2379
ord5655
ord4163
ord2120
ord6197
ord2367
ord2513
ord293
ord2645
ord6334
ord3089
ord4476
ord3742
ord818
ord4275
ord755
ord283
ord6172
ord5873
ord5789
ord470
ord4080
ord816
ord3797
ord562
ord4123
ord926
ord6663
ord1859
ord4246
ord3869
ord2127
ord2391
ord5102
ord5105
ord4468
ord3350
ord4742
ord2880
ord4153
ord2383
ord5284
ord5255
ord796
ord665
ord529
ord354
ord402
ord2494
ord2627
ord2626
ord6380
ord4287
ord4284
ord5871
ord2119
ord6625
ord2086
ord6069
ord6067
ord6000
ord2117
ord4457
ord3495
ord4076
ord4437
ord5032
ord4428
ord6785
ord2884
ord5651
ord3127
ord3616
ord1168
ord350
ord4224
ord5054
ord2364
ord922
ord2818
ord1640
ord2246
ord3517
ord5792
ord2527
ord482
ord323
ord1253
ord342
ord1182
ord4202
ord334
ord411
ord3394
ord2587
ord4406
ord3729
ord804
ord4267
ord2097
ord640
ord613
ord2753
ord5785
ord289
ord2405
ord5794
ord6119
ord472
ord2859
ord1825
ord4238
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
ord5653
ord4420
ord4953
ord4387
ord3454
ord3198
ord6080
ord6175
ord4623
ord4426
ord652
ord338
ord1138
ord1105
ord2919
ord2399
ord4823
ord4613
ord4786
ord1945
ord4273
ord5076
ord4341
ord4349
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4964
ord4961
ord4108
ord5240
ord3748
ord1726
ord4220
ord2584
ord3654
ord3571
ord813
ord560
ord2438
ord5260
ord4216
ord1146
ord4464
ord6270
ord2863
ord4432
ord2535
ord6194
ord4890
ord4899
ord4614
ord4589
ord6128
ord4723
ord6129
ord1644
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2054
ord2648
ord4439
ord4837
ord3798
ord5288
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord4905
ord5160
ord5162
ord5161
ord1907
ord823
ord4715
ord3092
ord6215
ord4299
ord4259
ord825
ord497
ord540
ord860
ord1008
ord535
ord771
ord800
ord4431
ord975
ord4627
ord1776
ord4078
ord6055
ord2528
ord1690
ord2860
ord1908
msvcrt
_strcmpi
__CxxFrameHandler
_EH_prolog
sin
cos
_ftol
fabs
atan
tan
sqrt
_mbscmp
acos
realloc
free
memcpy
memcmp
pow
floor
malloc
strcpy
abs
modf
atan2
strcat
sprintf
_except_handler3
?terminate@@YAXXZ
_initterm
_adjust_fdiv
memset
kernel32
ResumeThread
WaitForSingleObject
GetTickCount
Sleep
CreateMutexA
CreateFileA
SetFilePointer
ReadFile
CloseHandle
OpenFileMappingA
MapViewOfFile
GetModuleFileNameA
lstrcmpiA
lstrcpyA
FindResourceA
LoadResource
LockResource
SizeofResource
GetACP
GetVersionExA
lstrcmpA
user32
LoadIconA
GetParent
GetMenuItemCount
PostMessageA
EnableWindow
GetWindowRect
LoadStringA
CheckMenuItem
GetSubMenu
SetClassLongA
GetDC
TrackMouseEvent
SetMenu
UpdateWindow
KillTimer
SetTimer
RedrawWindow
LoadMenuA
GetSystemMetrics
IsWindowVisible
GetKeyState
GetWindow
GetCapture
ReleaseCapture
GetWindowLongA
SetCapture
SetRect
GetCursorPos
LoadCursorA
SetCursor
ScreenToClient
PtInRect
GetFocus
DrawFocusRect
GetSysColor
GetClientRect
ClientToScreen
GetMenu
FillRect
DestroyCursor
ValidateRect
SendMessageA
InvalidateRect
gdi32
Rectangle
LineTo
PolyBezierTo
MoveToEx
Polygon
CreateBrushIndirect
GetTextMetricsA
CreateFontIndirectA
GetTextExtentPoint32A
CreateSolidBrush
SelectObject
GetStockObject
GetObjectA
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
PatBlt
StretchBlt
BitBlt
DPtoLP
BeginPath
EndPath
StrokeAndFillPath
Polyline
Arc
Ellipse
GetTextFaceA
SetPixel
CreatePen
advapi32
RegEnumValueA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
comctl32
ImageList_ReplaceIcon
ord8
Exports
Exports
Sections
.text Size: 170KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ