Static task
static1
Behavioral task
behavioral1
Sample
NEAS.eead7101a9b122ab1abde3116b879420_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.eead7101a9b122ab1abde3116b879420_JC.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.eead7101a9b122ab1abde3116b879420_JC.exe
-
Size
157KB
-
MD5
eead7101a9b122ab1abde3116b879420
-
SHA1
be7202057910b6e70fbce7233c7082478b05cb0c
-
SHA256
644454099c8e1b65c2866d6e8b31980c5e581171acb4897d387be89868828491
-
SHA512
5b38176619a6ba234b94a6ef5e3865479c5663522c50f051781e2e86296d118147f2eb868b9e19b970202d2b6aba926214444036d165e84a83c51cf2ced1727d
-
SSDEEP
3072:MRliEpvmc+3QC2mCX1BhlVnzJJn1OkLZ0hUHcLeRy813rn3:ipvmazl/J1XZJZBr3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.eead7101a9b122ab1abde3116b879420_JC.exe
Files
-
NEAS.eead7101a9b122ab1abde3116b879420_JC.exe.exe windows:5 windows x86
325adc60ee72585119a8a7b577167d13
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
FindExecutableW
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
kernel32
SetEndOfFile
DecodePointer
WriteFile
HeapReAlloc
GetProcAddress
GetCurrentProcess
Sleep
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
SetCurrentDirectoryA
MultiByteToWideChar
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
CloseHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
RaiseException
GetCommandLineA
GetCommandLineW
GetACP
SetEnvironmentVariableA
GetCurrentDirectoryA
GetCurrentDirectoryW
HeapFree
HeapAlloc
CompareStringW
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DeleteFileW
SetFilePointerEx
GetStringTypeW
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetFileAttributesExW
GetFullPathNameW
SetStdHandle
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
RemoveDirectoryW
WriteConsoleW
ReadFile
ReadConsoleW
GetTimeZoneInformation
HeapSize
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ