Static task
static1
Behavioral task
behavioral1
Sample
NEAS.a0cc0d4dc2e85634ae57d709ecb3b5c0_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.a0cc0d4dc2e85634ae57d709ecb3b5c0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.a0cc0d4dc2e85634ae57d709ecb3b5c0_JC.exe
-
Size
1.0MB
-
MD5
a0cc0d4dc2e85634ae57d709ecb3b5c0
-
SHA1
b8270241efddab9a7415fb2160980018bc51447a
-
SHA256
4765599c0a3624cbec03991d3a25387682071546147f74ad333fe738f8dca723
-
SHA512
14f100572c814f927074bd6918000ecb29f10b8135423c0dac7f4e663add73a50fd7ef06c94e96f739840cffc337ba2bc44417cb9dca77426d30ba8e2906d6a7
-
SSDEEP
24576:UCtfCkNUjMpyiz7WXnHnX+/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:UCtnb5LNiXicJFFRGNzj3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.a0cc0d4dc2e85634ae57d709ecb3b5c0_JC.exe
Files
-
NEAS.a0cc0d4dc2e85634ae57d709ecb3b5c0_JC.exe.exe windows:5 windows x64
9e335943bf7b57b909eb4c1d8f1657fc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
clusapi
CloseCluster
ClusterResourceControl
GetClusterResourceNetworkName
OpenCluster
resutils
ResUtilEnumResources
kernel32
GetFileAttributesW
GetFileSizeEx
RtlLookupFunctionEntry
RtlUnwindEx
RaiseException
RtlPcToFileHeader
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
HeapFree
Sleep
ExitProcess
HeapReAlloc
SetStdHandle
GetFileType
HeapQueryInformation
HeapSize
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsAlloc
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetDateFormatA
GetTimeFormatA
LCMapStringW
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
lstrlenA
GetCurrentProcessId
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
WritePrivateProfileStringW
GlobalAddAtomW
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
GlobalFree
GlobalUnlock
LocalFree
GetLastError
SetLastError
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
WideCharToMultiByte
CompareStringA
GlobalLock
lstrcmpW
GlobalAlloc
SetErrorMode
GetModuleFileNameW
LoadLibraryW
GetProcAddress
FreeLibrary
GetSystemInfo
FileTimeToLocalFileTime
LoadResource
LockResource
SizeofResource
FindResourceW
MultiByteToWideChar
GetComputerNameW
GetCurrentProcess
GetCurrentDirectoryW
CloseHandle
DeleteFileW
GetSystemDirectoryW
CreateFileW
GetFileTime
FileTimeToSystemTime
GetLocaleInfoW
GetVersionExW
lstrcmpiW
FormatMessageW
lstrlenW
GetProcessHeap
HeapAlloc
GetCommandLineW
GetModuleHandleW
FlsFree
user32
DestroyMenu
ShowWindow
CharUpperW
LoadCursorW
GetSysColorBrush
GetWindowThreadProcessId
IsWindowEnabled
SetWindowTextW
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetMessageW
TranslateMessage
GetActiveWindow
GetCursorPos
ValidateRect
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassNameW
GetClassLongPtrW
SetPropW
RemovePropW
GetFocus
IsWindow
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
DispatchMessageW
GetDlgItem
GetTopWindow
GetWindowLongPtrW
SetWindowLongPtrW
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
GetKeyState
SetMenu
EnableWindow
SetForegroundWindow
IsWindowVisible
GetClientRect
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
GetParent
CopyRect
PtInRect
GetDlgCtrlID
SendMessageW
DefWindowProcW
CallWindowProcW
GetMenu
GetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetWindow
GetSysColor
GetPropW
ReleaseDC
GetDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
PostMessageW
PostQuitMessage
DestroyWindow
gdi32
CreateBitmap
GetStockObject
SetViewportOrgEx
ScaleWindowExtEx
DeleteDC
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
DeleteObject
GetClipBox
SetMapMode
SetTextColor
OffsetViewportOrgEx
comdlg32
GetFileTitleW
winspool.drv
XcvDataW
EnumPrinterDriversW
EnumMonitorsW
GetPrintProcessorDirectoryW
EnumPrintProcessorsW
EnumPortsW
ClosePrinter
DocumentPropertiesW
OpenPrinterW
EnumPrintersW
advapi32
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegDeleteKeyW
RegSetValueExW
RegEnumKeyExW
RegQueryInfoKeyW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegCreateKeyExW
RegSaveKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shlwapi
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathFindExtensionW
oleaut32
VariantClear
VariantChangeType
SysFreeString
SysAllocStringByteLen
SysStringByteLen
VariantInit
SysAllocString
Sections
.text Size: 304KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.2MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE