Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3faf5f2887017091a66bc3bd9aa52440_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.3faf5f2887017091a66bc3bd9aa52440_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.3faf5f2887017091a66bc3bd9aa52440_JC.exe
-
Size
1.8MB
-
MD5
3faf5f2887017091a66bc3bd9aa52440
-
SHA1
afe7cd119502a20591b98d13fc2190cf2470a87d
-
SHA256
c176fd525e2089d0b5bbdd7e75c1dc9ee19fefb97b145cf91a0a5413659c7fa5
-
SHA512
6c1c86e52cf2d0a38321ef402722f0b4f33d34adb2118787781f86d12051cc5f969132935dd29ed83f741d90f6eb8b0d779b46a0c6c5b967b2ad438555ad6686
-
SSDEEP
49152:87GUkLoN8e0ypjIsPcwR6vAJBy6jLhshjo4Sw6ETwCx7xmBqgfgAdg76BpdrMSo9:87GUkLoN8ejpjIsPcwR6vAJBy6jLhshV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.3faf5f2887017091a66bc3bd9aa52440_JC.exe
Files
-
NEAS.3faf5f2887017091a66bc3bd9aa52440_JC.exe.exe windows:4 windows x86
d1ab4630c5e279cd6a72d10f47d49261
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
MulDiv
Sleep
GlobalUnlock
GlobalLock
GlobalAlloc
LocalFree
FormatMessageA
GlobalMemoryStatus
GetVersionExA
GetFullPathNameA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateThread
SuspendThread
GetCurrentThread
SetThreadPriority
CreateThread
SetEndOfFile
GlobalFree
GetWindowsDirectoryA
GetCurrentDirectoryA
InterlockedExchange
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
ExitProcess
TerminateProcess
GetCurrentProcess
GetSystemTimeAsFileTime
DeleteFileA
FlushFileBuffers
SetFilePointer
VirtualQuery
GetFileType
MoveFileA
HeapAlloc
HeapFree
SetLastError
GetCurrentThreadId
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
GetTimeZoneInformation
ReadFile
HeapReAlloc
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
CompareStringA
CompareStringW
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
QueryPerformanceCounter
GetTickCount
SetEnvironmentVariableA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
TlsFree
TlsAlloc
TlsSetValue
TlsGetValue
CreateFileA
LoadResource
SizeofResource
LockResource
FindResourceA
GetLastError
GetModuleHandleA
CreateNamedPipeA
ConnectNamedPipe
CloseHandle
WriteFile
GetFileAttributesA
SetFileAttributesA
LoadLibraryA
GetProcAddress
FreeLibrary
GetCurrentProcessId
InterlockedIncrement
SetStdHandle
InterlockedDecrement
comctl32
ImageList_Destroy
ImageList_Create
InitCommonControlsEx
ImageList_Draw
ImageList_GetIconSize
ImageList_ReplaceIcon
user32
GetMenuItemInfoA
InsertMenuItemA
GetMenuItemCount
GetSystemMetrics
DrawTextA
DrawEdge
CopyRect
InflateRect
GetSysColorBrush
TrackPopupMenuEx
OffsetRect
FillRect
RemoveMenu
DestroyMenu
CreateMenu
CreatePopupMenu
GetKeyState
CloseClipboard
EmptyClipboard
OpenClipboard
SetClipboardData
UnregisterClassA
CreateCursor
SetWindowPos
SetFocus
GetDlgItemTextA
EnableMenuItem
GetSystemMenu
DialogBoxIndirectParamA
ScreenToClient
LoadStringA
DestroyWindow
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
SetWindowTextA
SetForegroundWindow
PostMessageA
SetMenu
IsWindow
GetWindowRect
GetDesktopWindow
ClientToScreen
BeginPaint
EndPaint
MoveWindow
GetWindowTextLengthA
GetWindowTextA
LoadBitmapA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
MessageBoxA
LoadAcceleratorsA
LoadIconA
FindWindowA
GetWindowThreadProcessId
SetRectEmpty
SystemParametersInfoA
DialogBoxParamA
GetParent
SendMessageA
SetDlgItemTextA
GetDC
ReleaseDC
InvalidateRect
GetDlgItem
SetCursor
GetSysColor
EndDialog
SendDlgItemMessageA
GetClassInfoA
RegisterClassA
GetWindowLongA
PostQuitMessage
SetWindowLongA
DefWindowProcA
GetClientRect
SetRect
CreateWindowExA
gdi32
PatBlt
CreateBitmap
SetBkColor
SelectObject
CreateCompatibleDC
SetTextColor
SetBkMode
CreateSolidBrush
GetStockObject
GetDeviceCaps
CreateFontIndirectA
BitBlt
DeleteDC
GetTextExtentPoint32A
DeleteObject
GetObjectA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegFlushKey
RegEnumKeyExA
shell32
DragQueryFileA
DragFinish
DragAcceptFiles
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHGetMalloc
ole32
OleUninitialize
OleInitialize
CoInitialize
CoUninitialize
StgOpenStorage
CoTaskMemFree
StgIsStorageFile
CLSIDFromString
ReleaseStgMedium
CoCreateInstance
oleaut32
SysFreeString
SysStringByteLen
VariantInit
SysAllocString
VariantClear
SafeArrayPutElement
SafeArrayCreate
SafeArrayDestroyDescriptor
SafeArrayCreateVector
GetErrorInfo
SysAllocStringByteLen
Sections
.text Size: 548KB - Virtual size: 546KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
CONST Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_TEXT Size: 1012KB - Virtual size: 1010KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
xdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_BSS Size: - Virtual size: 245B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_DATA Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRT Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ