Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b1bec493891f7f7c56bc27fb688caa50_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.b1bec493891f7f7c56bc27fb688caa50_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.b1bec493891f7f7c56bc27fb688caa50_JC.exe
-
Size
568KB
-
MD5
b1bec493891f7f7c56bc27fb688caa50
-
SHA1
d513790d63f27d4183ee9903462d0e3782b3eef4
-
SHA256
345bd56591927408ad87b19ebc3cab985aa68a6acb03478b7a0d20da7fef84ad
-
SHA512
e27782a9707795e9952a42cf4d23e9df227436be7b19122005e471c8621127af208e6b34281077dad41482f9e93b32803f8310a945954ac724a24a8c6a594595
-
SSDEEP
12288:mK6KsKfan7NqESqnoae7mXRSEctRg2ia93SDapH9:OKsKfa7NqESqemXRSp7QDan
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.b1bec493891f7f7c56bc27fb688caa50_JC.exe
Files
-
NEAS.b1bec493891f7f7c56bc27fb688caa50_JC.exe.exe windows:4 windows x86
367374a55b2c622f2cf0122dcfe749cf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
WideCharToMultiByte
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
RaiseException
SetEndOfFile
InterlockedExchange
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetStdHandle
FlushFileBuffers
CreateFileA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCPInfo
GetOEMCP
GetACP
VirtualQuery
VirtualProtect
HeapSize
CloseHandle
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
WriteFile
ReadFile
GetCurrentProcess
TerminateProcess
ExitProcess
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetStartupInfoA
GetModuleHandleA
SetCurrentDirectoryA
SetEnvironmentVariableA
DeleteFileA
FindNextFileA
GetLocalTime
FindClose
FindFirstFileA
GetShortPathNameA
GlobalFree
GlobalUnlock
MulDiv
GlobalAlloc
GlobalLock
GetCommandLineA
Sleep
GetTickCount
GetVersion
WinExec
GetSystemInfo
GetSystemDirectoryA
GetWindowsDirectoryA
GlobalMemoryStatus
GetComputerNameA
LoadLibraryA
GetProcAddress
MultiByteToWideChar
CreateDirectoryA
GetLastError
HeapReAlloc
GetFullPathNameA
FreeLibrary
GetModuleFileNameA
GetCurrentDirectoryA
GetDriveTypeA
HeapAlloc
HeapFree
user32
SendMessageA
CreateWindowExA
DestroyWindow
ChangeDisplaySettingsA
UnregisterClassA
ShowWindow
GetCursorPos
SetWindowPos
SetCursorPos
GetSystemMetrics
ReleaseDC
GetFocus
IsWindowEnabled
SetFocus
IsDlgButtonChecked
PostMessageA
CallWindowProcA
GetDlgCtrlID
GetDlgItemTextA
EndPaint
FillRect
LoadIconA
GetClientRect
BeginPaint
SetWindowLongA
InvalidateRect
GetDC
GetWindowLongA
DefWindowProcA
TabbedTextOutA
GetSysColor
GetActiveWindow
IsWindowVisible
SetWindowTextA
LoadCursorA
RegisterClassA
MoveWindow
GetMessageA
MsgWaitForMultipleObjects
TranslateMessage
MapVirtualKeyA
PeekMessageA
DispatchMessageA
FindWindowA
GetWindowRect
SetActiveWindow
EnumDisplaySettingsA
ShowCursor
GetAsyncKeyState
MessageBoxA
gdi32
MoveToEx
BitBlt
GetTextExtentPoint32A
LineTo
SetTextColor
DeleteDC
CreateDIBSection
StretchBlt
CreateFontIndirectA
SetDIBColorTable
SetPixel
CreatePalette
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
Rectangle
Ellipse
RealizePalette
SelectPalette
SetStretchBltMode
CreatePen
GetTextMetricsA
GetPixel
GetStockObject
CreateSolidBrush
GetDeviceCaps
comdlg32
GetSaveFileNameA
GetOpenFileNameA
ChooseColorA
advapi32
GetUserNameA
shell32
ShellExecuteExA
ShellExecuteA
SHGetSpecialFolderPathA
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
winmm
mciSendStringA
sndPlaySoundA
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ