Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d58739a3bc950aab10be328bfac4bbf0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.d58739a3bc950aab10be328bfac4bbf0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.d58739a3bc950aab10be328bfac4bbf0_JC.exe
-
Size
6.9MB
-
MD5
d58739a3bc950aab10be328bfac4bbf0
-
SHA1
373c576b1fbd6ee595448db53fff3e70f3df8e16
-
SHA256
955d5f46ef2b6aef600fa9df79c5b2c050260f908b8ef9c2082da87a267a2d14
-
SHA512
2e9f615ee6dc082d1f82dccb203cf24d66ed312f5e6477346702218d1b5f498d16533fec4e99905b7a85cf7d86ed051d2d3c64acfc870c99de369a29ff67a842
-
SSDEEP
196608:20tjZlrr1tquJZUgWp3fhudIMjVfrfvJr03sp:20trmGe3pu2MjVbVk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.d58739a3bc950aab10be328bfac4bbf0_JC.exe
Files
-
NEAS.d58739a3bc950aab10be328bfac4bbf0_JC.exe.exe windows:6 windows x86
5293c3893c9ef329b367f4d2dbd6ae33
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExW
GetOEMCP
GetACP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameW
SetFilePointerEx
ReadFile
GetConsoleMode
WriteFile
GetCurrentThreadId
GetProcessHeap
IsDebuggerPresent
HeapSize
AreFileApisANSI
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
SetStdHandle
GetProcAddress
GetModuleHandleW
GetStartupInfoW
TlsFree
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
HeapAlloc
GetCPInfo
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
HeapReAlloc
GetStringTypeW
DecodePointer
EncodePointer
WriteConsoleW
ReadConsoleW
OutputDebugStringW
SetEndOfFile
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
SetConsoleTextAttribute
Sleep
GetStdHandle
SetConsoleCursorPosition
GetConsoleScreenBufferInfo
FillConsoleOutputAttribute
FillConsoleOutputCharacterA
MultiByteToWideChar
MapViewOfFile
GetSystemTime
SetConsoleMode
GetCurrentProcessId
GetModuleHandleA
FindNextFileA
GetFileType
GlobalFree
EnterCriticalSection
CreateNamedPipeA
IsDBCSLeadByteEx
GetLastError
TerminateProcess
LeaveCriticalSection
GetSystemTimeAdjustment
GetProcessTimes
GetWindowsDirectoryA
GetLocaleInfoA
CreateThread
LocalFree
CloseHandle
DeleteCriticalSection
CreatePipe
SetLastError
GlobalUnlock
CreateFileW
GetTimeZoneInformation
GetSystemDirectoryA
InitializeCriticalSectionAndSpinCount
TlsSetValue
GetCommandLineA
WaitForSingleObjectEx
SetCommBreak
GlobalLock
SetHandleInformation
GetModuleHandleExW
HeapFree
QueryPerformanceCounter
InitializeSListHead
GetCurrentProcess
GetCommState
UnmapViewOfFile
GetDateFormatW
GetCommandLineW
GetSystemDefaultLangID
GetCurrentThread
WaitNamedPipeA
GetLocalTime
WideCharToMultiByte
FindFirstFileA
Beep
GetConsoleCP
FlushFileBuffers
SetCommState
user32
GetKeyboardLayout
CheckMenuRadioItem
SetWindowPos
IsWindow
RegisterClassA
DestroyWindow
CreateDialogParamA
IsIconic
LoadIconA
MessageBeep
BeginPaint
GetWindowRect
InflateRect
UnionRect
EndDialog
ShowWindow
ReleaseCapture
SetWindowTextA
UpdateWindow
AdjustWindowRect
GetCaretBlinkTime
DrawFrameControl
SetScrollInfo
IsRectEmpty
GetDoubleClickTime
ShowOwnedPopups
EndPaint
ClientToScreen
SetCursor
GetMessageA
DestroyAcceleratorTable
HideCaret
PostQuitMessage
SetKeyboardState
SetCapture
RemovePropA
CreateMenu
GetWindowTextLengthA
DrawEdge
ShowCaret
RegisterWindowMessageA
CreateIconIndirect
GetDC
GetCapture
DrawFocusRect
SetWindowLongA
GetScrollInfo
InvalidateRect
BringWindowToTop
GetWindowLongA
ReleaseDC
GetDlgItem
DestroyCaret
CheckDlgButton
SetMenu
DeferWindowPos
SystemParametersInfoA
GetSystemMetrics
SetCaretPos
EnableWindow
EndMenu
FindWindowA
GetDlgItemTextA
CheckMenuItem
GetClientRect
MessageBoxA
UnregisterClassA
BeginDeferWindowPos
DestroyIcon
GetSystemMenu
SendDlgItemMessageA
GetSysColor
IsDlgButtonChecked
UnhookWindowsHookEx
GetParent
RedrawWindow
CreateCaret
ToUnicode
GetQueueStatus
ScrollWindowEx
SetWindowsHookExA
MoveWindow
ToAsciiEx
gdi32
SetPixel
GetRegionData
SelectObject
PtInRegion
CreateCompatibleDC
CreateRectRgnIndirect
PlayEnhMetaFile
Rectangle
RealizePalette
GetCurrentPositionEx
SelectPalette
SetPaletteEntries
GetCharABCWidthsW
GetNearestPaletteIndex
CreateRectRgn
GetCharABCWidthsFloatA
SetViewportExtEx
GetPixel
EndDoc
RestoreDC
SetMapMode
GetTextExtentExPointA
SetStretchBltMode
GetTextExtentPointA
RectVisible
CreateFontIndirectA
GdiFlush
CloseEnhMetaFile
DeleteObject
CreateDIBitmap
SetDIBColorTable
GetSystemPaletteEntries
UpdateColors
CombineRgn
OffsetRgn
CreatePen
CreateBitmapIndirect
GetObjectType
ExtCreateRegion
Ellipse
CreatePenIndirect
GetPaletteEntries
ExcludeClipRect
CopyEnhMetaFileA
CreateHatchBrush
MaskBlt
GetStockObject
SetPolyFillMode
GetCharacterPlacementW
CreatePalette
BitBlt
DeleteDC
SetTextColor
SetWindowExtEx
ExtFloodFill
EndPage
CreatePolygonRgn
GetBitmapBits
TextOutA
GetClipBox
IntersectClipRect
advapi32
RegDeleteValueA
InitializeSecurityDescriptor
GetLengthSid
AllocateAndInitializeSid
SetSecurityDescriptorDacl
EqualSid
SetSecurityDescriptorOwner
GetUserNameA
shell32
CommandLineToArgvW
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.info Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5.8MB - Virtual size: 32.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.info Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dnck Size: 512B - Virtual size: 152B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.spiq Size: 512B - Virtual size: 290B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ