Static task
static1
Behavioral task
behavioral1
Sample
NEAS.46c85bfe394e7364a55f23118f8a3b40_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.46c85bfe394e7364a55f23118f8a3b40_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.46c85bfe394e7364a55f23118f8a3b40_JC.exe
-
Size
256KB
-
MD5
46c85bfe394e7364a55f23118f8a3b40
-
SHA1
8dcbd9923b1764256448da517f757fc6aabaa01c
-
SHA256
6c1656bddd05f13ef1eee6d140af89e623136913d7f6cfed279d5a2aeaba7388
-
SHA512
6c57a5d58a17fc662f3b50f946fb5cae0228b743e0f4772a9d5d970b0309f51c28d191cb88fca4f2b592d42929fd5c7558a730341bd921ef93f8762920f0137e
-
SSDEEP
3072:WD+4Gg3JkS7e8VdywmzQNcthJSKkpxj3yVf6Iu2lQBV+UdE+rECWp7hKO/ZM6r:WD7uRqyIkV2BV+UdvrEFp7hKkZMK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.46c85bfe394e7364a55f23118f8a3b40_JC.exe
Files
-
NEAS.46c85bfe394e7364a55f23118f8a3b40_JC.exe.exe windows:4 windows x86
d4df3969503ccceda73fbdfbdc245cc2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
CreateFileA
ExpandEnvironmentStringsA
GetDateFormatA
GetTimeFormatA
CloseHandle
FindClose
GetWindowsDirectoryA
GetDriveTypeA
GetLocalTime
MulDiv
GetModuleFileNameA
GlobalAlloc
GlobalLock
lstrcpyA
lstrlenA
GlobalUnlock
WideCharToMultiByte
ReadFile
SetCurrentDirectoryA
CreateThread
GetSystemTime
GetVersionExA
LoadLibraryA
FreeLibrary
SetErrorMode
GetFileAttributesA
GetProcAddress
MoveFileA
FileTimeToLocalFileTime
GetShortPathNameA
CompareFileTime
MultiByteToWideChar
FileTimeToSystemTime
GetProfileStringA
GetCurrentDirectoryA
GetProfileIntA
GetLastError
GetCPInfo
LCMapStringW
GetACP
GetStringTypeW
GetStringTypeA
LCMapStringA
HeapReAlloc
VirtualAlloc
IsBadWritePtr
HeapCreate
HeapDestroy
VirtualFree
GetVersion
GetCommandLineA
ExitProcess
GetModuleHandleA
RtlUnwind
GetStartupInfoA
HeapAlloc
GetCurrentProcess
HeapFree
FreeEnvironmentStringsA
FreeEnvironmentStringsW
UnhandledExceptionFilter
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
WriteFile
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
GetOEMCP
TerminateProcess
SetFilePointer
SetEndOfFile
GlobalFree
user32
FillRect
GetSysColor
CreateMenu
WindowFromPoint
ClientToScreen
GetMenuState
CallWindowProcA
FindWindowExA
IsMenu
GetKeyState
GetMessageTime
ChildWindowFromPoint
SetTimer
LoadIconA
CreateDialogParamA
BringWindowToTop
SetFocus
CheckRadioButton
DispatchMessageA
SetCapture
AppendMenuA
SystemParametersInfoA
ReleaseCapture
IsWindow
ScreenToClient
GetMessagePos
MapWindowPoints
LoadBitmapA
GetDlgItemInt
CheckDlgButton
SetDlgItemInt
SendMessageA
wsprintfA
RegisterClassExA
RegisterClassA
LoadAcceleratorsA
TranslateMessage
LoadStringA
GetDlgItem
ShowWindow
EnableWindow
DialogBoxParamA
EndDialog
GetWindow
GetWindowTextA
LoadImageA
EmptyClipboard
SetClipboardData
CloseClipboard
TabbedTextOutA
EndDeferWindowPos
DeferWindowPos
PostQuitMessage
IsIconic
DefWindowProcA
MessageBoxA
DestroyWindow
PostMessageA
WinHelpA
IsWindowVisible
BeginDeferWindowPos
GetParent
GetClientRect
GetSystemMetrics
SendDlgItemMessageA
GetDlgItemTextA
SetDlgItemTextA
GetWindowRect
GetDC
ReleaseDC
SetWindowPos
CheckMenuRadioItem
MapDialogRect
EnableMenuItem
SetWindowTextA
CheckMenuItem
IsDlgButtonChecked
CreatePopupMenu
GetCursorPos
MessageBeep
GetMenuItemID
GetMenuItemCount
GetMenuItemInfoA
GetMenuStringA
TrackPopupMenu
DestroyMenu
CreateWindowExA
RemoveMenu
InsertMenuA
IsDialogMessageA
GetWindowLongA
SetWindowLongA
LoadCursorA
KillTimer
SetCursor
TranslateAcceleratorA
GetMessageA
OpenClipboard
gdi32
CreateFontA
PatBlt
GetTextMetricsA
GetTextExtentPoint32A
StartPage
EndPage
SelectObject
EndDoc
StartDocA
DeleteDC
CreateFontIndirectA
CreatePolygonRgn
GetStockObject
TextOutA
SetBkMode
CreatePen
CreateSolidBrush
SetTextColor
DeleteObject
GetDeviceCaps
comdlg32
GetSaveFileNameA
GetOpenFileNameA
PrintDlgA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExA
shell32
SHChangeNotify
SHGetDesktopFolder
ShellExecuteExA
SHGetMalloc
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetFileInfoA
SHFileOperationA
ole32
StgIsStorageFile
OleUninitialize
WriteClassStg
DoDragDrop
CoCreateInstance
OleInitialize
StgCreateDocfile
StgOpenStorage
ReadClassStg
comctl32
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
ord17
ImageList_Draw
CreateToolbarEx
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE