Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c34b837587136f0bcbf888d765bde980_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.c34b837587136f0bcbf888d765bde980_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.c34b837587136f0bcbf888d765bde980_JC.exe
-
Size
593KB
-
MD5
c34b837587136f0bcbf888d765bde980
-
SHA1
303a02048b78d8af30dc8db87b3f0fb304c9b790
-
SHA256
f94bbd90a84cb0db6d580e9f59ab062167cbd56a3738d017092d0e22cc1e4d94
-
SHA512
ccd13ccd249599ff5a5a279899a3a6efffa9ae57dfddb1f159c244ce686d704263439f90e52ac191e8c9847cb816bf95db0283640fae21d3aee80862ce175dc0
-
SSDEEP
12288:Iqo0xzkoJAonzXw2wXBvG6Az1m2DQlVCBTk:IE5AonTwpRG6A5sVq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.c34b837587136f0bcbf888d765bde980_JC.exe
Files
-
NEAS.c34b837587136f0bcbf888d765bde980_JC.exe.exe windows:5 windows x86
f1f9491b08328f8a4fbce4fc94b60fbc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
GetFullPathNameA
GetCPInfo
GetOEMCP
GetFileSizeEx
GetFileTime
SetErrorMode
GetTickCount
HeapFree
UnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
RtlUnwind
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
IsValidCodePage
LCMapStringA
LCMapStringW
DuplicateHandle
GetStdHandle
GetConsoleCP
GetConsoleMode
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
InterlockedCompareExchange
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GlobalFlags
GetCurrentDirectoryA
GetThreadLocale
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
InterlockedIncrement
GetModuleHandleW
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
InterlockedDecrement
GetModuleFileNameW
GlobalAddAtomA
FreeResource
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
FreeLibrary
GetModuleHandleA
SetLastError
MulDiv
WritePrivateProfileStringA
SetFileAttributesA
RemoveDirectoryA
CopyFileA
CreateDirectoryA
WinExec
GetSystemDirectoryA
DeleteFileA
lstrcmpA
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
Sleep
GetPrivateProfileIntA
LocalAlloc
lstrlenA
LocalFree
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
GetProcAddress
LoadLibraryA
SetUnhandledExceptionFilter
FormatMessageA
GetLastError
MultiByteToWideChar
GetACP
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcpyA
CloseHandle
CreateProcessA
WaitForSingleObject
GetFileAttributesA
OutputDebugStringA
GetPrivateProfileStringA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
SetHandleCount
GetModuleFileNameA
CreateFileW
user32
PostThreadMessageA
SetMenu
SetForegroundWindow
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
CopyRect
DefWindowProcA
CallWindowProcA
PtInRect
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextA
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
GetLastActivePopup
MessageBoxA
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetNextDlgTabItem
EndDialog
GetWindow
SetWindowContextHelpId
GetParent
MapDialogRect
SetWindowPos
PostQuitMessage
GetMenuState
FindWindowA
MessageBeep
GetNextDlgGroupItem
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableWindow
ChangeDisplaySettingsA
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
PostMessageA
RegisterClipboardFormatA
SendMessageA
LoadIconA
DestroyMenu
UnregisterClassA
GetWindowThreadProcessId
CharUpperA
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
MapWindowPoints
GetTopWindow
GetMessageTime
UnhookWindowsHookEx
GetMessagePos
gdi32
SetMapMode
DeleteObject
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
GetStockObject
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathRemoveBackslashA
SHGetValueA
PathFileExistsA
PathRemoveFileSpecA
PathAddBackslashA
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
PathIsUNCA
SHSetValueA
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
OleInitialize
CoTaskMemFree
CoCreateInstance
CoInitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemAlloc
oleaut32
SysStringLen
SysAllocStringByteLen
SysAllocStringLen
VariantClear
VariantChangeType
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
SysFreeString
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
wininet
InternetSetCookieA
Sections
.text Size: 373KB - Virtual size: 373KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ