Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3b496143f71a3ca283f7da56021d4510_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.3b496143f71a3ca283f7da56021d4510_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.3b496143f71a3ca283f7da56021d4510_JC.exe
-
Size
221KB
-
MD5
3b496143f71a3ca283f7da56021d4510
-
SHA1
8c79998e0ee950140a0ceba0180718c423f46b50
-
SHA256
d9c9b9cb682587fa54dca11bf825d9601a9286be70504a35dbf33ec639673663
-
SHA512
c3e4ed537e49f6a42c717784c6a00bd9a57976cdee0ffb92fb5c44b55bcedf76dbb8639f6575e204974846f3935af953f69911ff0719d0d83728a6eb4c949826
-
SSDEEP
3072:pRqzo7LMXviK/bIpXrzIOPHdZDWmEngiqE3QqHikOX71cWVYEgnBEY/PH:XcoeviKD6r0OPHdZDWVBIvVYlBdP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.3b496143f71a3ca283f7da56021d4510_JC.exe
Files
-
NEAS.3b496143f71a3ca283f7da56021d4510_JC.exe.exe windows:5 windows x86
2875e66330bef5f30b34bba2c73e4e94
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalCompact
WriteConsoleOutputCharacterA
ReadConsoleA
GetConsoleAliasA
GetEnvironmentStringsW
GetUserDefaultLCID
SetConsoleScreenBufferSize
WriteConsoleInputA
AddConsoleAliasW
OpenSemaphoreA
GetFileAttributesExA
SetTapeParameters
MoveFileWithProgressA
GetModuleHandleW
GenerateConsoleCtrlEvent
GetWindowsDirectoryA
GetConsoleAliasExesW
WaitNamedPipeW
FindActCtxSectionStringA
SetCommState
AddRefActCtx
GlobalFindAtomA
LoadLibraryW
SetCommConfig
CopyFileW
_hread
CreateEventA
SetConsoleCP
GetFileAttributesA
SetConsoleMode
SetSystemPowerState
TerminateProcess
GetCompressedFileSizeA
GetTimeZoneInformation
lstrlenW
FindNextVolumeMountPointW
GetStartupInfoW
WriteConsoleInputW
GetShortPathNameA
GetConsoleAliasesW
FindFirstFileA
GetLastError
GetCurrentDirectoryW
SetLastError
EnumSystemCodePagesW
LoadLibraryA
LocalAlloc
MoveFileA
AddVectoredExceptionHandler
RemoveDirectoryW
SetFileApisToANSI
WriteProfileSectionW
VirtualLock
GlobalGetAtomNameW
GetCurrentConsoleFont
FoldStringA
FindNextFileA
FindNextFileW
GetStringTypeW
VirtualProtect
CompareStringA
GetFileTime
QueryPerformanceFrequency
FatalAppExitA
FindAtomW
GetWindowsDirectoryW
DeleteFileW
MoveFileWithProgressW
GetTempPathA
ResetWriteWatch
ReadConsoleOutputCharacterW
EnumSystemLocalesW
ExpandEnvironmentStringsW
WriteConsoleW
SetLocaleInfoA
ReplaceFileA
GetNumaNodeProcessorMask
FlushFileBuffers
SetStdHandle
GetConsoleMode
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
SetFilePointer
CloseHandle
GetProcAddress
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
GetConsoleCP
CreateFileW
user32
CharUpperA
advapi32
ClearEventLogA
AbortSystemShutdownW
winhttp
WinHttpGetProxyForUrl
WinHttpReadData
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ