Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f8af2ab7a616e91cece62b24a7f169e0_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.f8af2ab7a616e91cece62b24a7f169e0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.f8af2ab7a616e91cece62b24a7f169e0_JC.exe
-
Size
350KB
-
MD5
f8af2ab7a616e91cece62b24a7f169e0
-
SHA1
f0566e9d29dc0e3c98ebe519db1d9698ec9bd12f
-
SHA256
a176481b08aa84d5b71f781e1ec7164264ef575ec8a71d52897b4fbe42c31341
-
SHA512
e5ead06ab932b467cc77d34b9a5ef649dda82f3fc4ad7b872a3d9dbfa8949a7081d1ec47f8e1e0505a87c116a706adfc527911e793b1dcd7720a00c0a509c249
-
SSDEEP
6144:NR/fZovrkaTimL2hkdr1x/TsVlpp+h6hAyYcelUxfORNkB93apPMBceQSmJjkiIi:NR/ffaumL2hkdr1x/TsVlppjYcelmfO5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.f8af2ab7a616e91cece62b24a7f169e0_JC.exe
Files
-
NEAS.f8af2ab7a616e91cece62b24a7f169e0_JC.exe.exe windows:4 windows x86
3212f02ba61607583706217b17a7a70f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AccessCheck
AddAccessAllowedAce
AllocateAndInitializeSid
DuplicateToken
FreeSid
GetLengthSid
InitializeAcl
InitializeSecurityDescriptor
IsValidSecurityDescriptor
OpenProcessToken
OpenThreadToken
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegOpenKeyW
RegQueryInfoKeyW
RegQueryValueExW
RegSetValueExW
SetEntriesInAclW
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
kernel32
AddAtomA
CloseHandle
CreateDirectoryW
CreateFileW
CreateProcessW
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileW
EnterCriticalSection
ExitProcess
FindAtomA
FormatMessageW
GetAtomNameA
GetCommandLineA
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetEnvironmentVariableW
GetExitCodeProcess
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetSystemDefaultLCID
GetUserDefaultLCID
GetVersionExW
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsValidLocale
LeaveCriticalSection
LocalAlloc
LocalFree
MultiByteToWideChar
OpenProcess
Process32FirstW
Process32NextW
ReadFile
ReleaseSemaphore
SetEnvironmentVariableW
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
msvcrt
_fdopen
_read
_strdup
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_ctype
_errno
_filelengthi64
_fstati64
_iob
_lseeki64
_onexit
_setmode
_wfopen
_wrmdir
_wstat
abort
atexit
fclose
fflush
fgetpos
fopen
fread
free
fsetpos
fwprintf
fwrite
fwscanf
getc
malloc
memchr
memcpy
memmove
memset
putc
setlocale
setvbuf
signal
strcmp
strcoll
strcpy
strftime
strlen
strstr
strtod
strxfrm
toupper
ungetc
wcscat
wcscmp
wcscpy
wcslen
wcsrchr
wcsstr
ole32
CoCreateInstance
CoInitialize
oleaut32
SysAllocString
SysFreeString
shell32
SHGetDesktopFolder
SHGetMalloc
SHGetSpecialFolderPathW
ShellExecuteExW
shlwapi
PathFileExistsW
PathRemoveBackslashW
user32
GetDlgItem
LoadStringW
MessageBoxW
RegisterWindowMessageW
SendMessageTimeoutW
SetWindowTextW
Sections
.text Size: 271KB - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 21KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE