Static task
static1
Behavioral task
behavioral1
Sample
NEAS.222592fe2af983c6edbc6a969f71e4c0_JC.exe
Resource
win7-20231020-en
General
-
Target
NEAS.222592fe2af983c6edbc6a969f71e4c0_JC.exe
-
Size
224KB
-
MD5
222592fe2af983c6edbc6a969f71e4c0
-
SHA1
31716d793b0466dfa48eb5a60224e7649502f7fa
-
SHA256
99aa8ee5034870ac82cf348679c75f884c605f7d3b043750d39111e2365f5108
-
SHA512
8be360673a247c9d60aa793dfe8cc433e7244036a295f89043917d4a8721a0e9c4902f4e191c8dbbc709675076fdf5de03d8fc3cccd28f1894b7ae971fe80a1f
-
SSDEEP
6144:msuYDtaddzylzNmKS7FYflWdpku5NCQIztoGw/WQsS:meI7FADu/CQIztJk5sS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.222592fe2af983c6edbc6a969f71e4c0_JC.exe
Files
-
NEAS.222592fe2af983c6edbc6a969f71e4c0_JC.exe.exe windows:4 windows x86
9c82236ad14f5d892b7d3eb266c9a2a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GetProcAddress
GetModuleHandleA
GetVersionExA
SetLastError
CreateDirectoryA
SetFileAttributesA
GetFileAttributesA
CopyFileA
RemoveDirectoryA
FindNextFileA
GetSystemDirectoryA
GetUserDefaultLangID
WinExec
Sleep
SetCurrentDirectoryA
GetCurrentProcess
GetCurrentThread
FormatMessageA
HeapFree
GetProcessHeap
HeapAlloc
OpenProcess
GetTickCount
CreateProcessA
FlushFileBuffers
HeapSize
SetStdHandle
lstrcmpA
InterlockedExchange
InitializeCriticalSection
VirtualQuery
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
HeapReAlloc
VirtualAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FreeLibrary
LoadLibraryA
GetModuleFileNameA
GetPrivateProfileStringA
SetFilePointer
GetLastError
CreateMutexA
WaitForSingleObject
WriteFile
GetTempPathA
GetTempFileNameA
CreateFileA
GetFileSize
ReadFile
FindFirstFileA
FindClose
DeleteFileA
CloseHandle
LocalFree
lstrlenW
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
UnhandledExceptionFilter
GetStdHandle
TerminateProcess
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
ExitProcess
LCMapStringA
LCMapStringW
GetACP
GetOEMCP
GetCPInfo
GetStringTypeA
GetStringTypeW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetUnhandledExceptionFilter
user32
LoadStringA
DefWindowProcA
PostQuitMessage
UpdateWindow
ShowWindow
FindWindowA
KillTimer
PostMessageA
CreateWindowExA
SetTimer
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
LoadIconA
RegisterClassA
winspool.drv
EnumPrintersA
ClosePrinter
GetPrinterDriverA
OpenPrinterA
EnumPrinterDriversA
GetPrinterDriverDirectoryA
GetPrinterA
SetPrinterA
AddMonitorA
DeleteMonitorA
AddPrinterDriverA
advapi32
EqualSid
LookupAccountSidA
CreateProcessAsUserA
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetLengthSid
CopySid
RegGetKeySecurity
GetSecurityDescriptorDacl
GetAclInformation
GetSidSubAuthorityCount
GetAce
GetSidSubAuthority
RegSetKeySecurity
RegDeleteKeyA
RegSetValueExA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyExA
RegCreateKeyExA
OpenThreadToken
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
FreeSid
RegOpenKeyA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE