Static task
static1
Behavioral task
behavioral1
Sample
NEAS.eaa40f46668f7737785f97ed9ea74ab0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.eaa40f46668f7737785f97ed9ea74ab0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.eaa40f46668f7737785f97ed9ea74ab0_JC.exe
-
Size
4.0MB
-
MD5
eaa40f46668f7737785f97ed9ea74ab0
-
SHA1
b4d4ec0b47472af019eeb3bb4245081d014d6315
-
SHA256
d1881f5f47227b6d8238856dfb3834110f31186d114e2e814d073bee8bd1b6b3
-
SHA512
84a6119e6674d74f1e1146f863d59ce74d412c890aa49e3c914bb46d5043f9555f143609c29359d43315e39d0e2623a5e897f9e64f805b3d7a9ebf3795bb62b1
-
SSDEEP
98304:OvkuPVbmHlqfhLeJXaKw3PE88LXJpFEFEhDeHHUaXRlBlpvk0kcHgaqKPyLRTBq1:Ov9PVbmHlqfhLe0EhDeHHUaXRlBlpvk2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.eaa40f46668f7737785f97ed9ea74ab0_JC.exe
Files
-
NEAS.eaa40f46668f7737785f97ed9ea74ab0_JC.exe.exe windows:4 windows x86
072bdc21d65b856c1ce6d795892cecd6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
GlobalFlags
GlobalGetAtomNameA
GetThreadLocale
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetCPInfo
GetOEMCP
MoveFileA
DeleteFileA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
CreateFileA
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetConsoleCP
GetCurrentThreadId
HeapReAlloc
VirtualProtect
VirtualAlloc
VirtualQuery
RtlUnwind
SetEnvironmentVariableA
GetCommandLineA
ExitThread
CreateThread
ExitProcess
RaiseException
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetACP
SetStdHandle
GetFileType
SetHandleCount
GetStartupInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetTickCount
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
ResumeThread
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
GetCurrentProcessId
GetModuleFileNameA
InterlockedDecrement
GetModuleHandleA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
SetLastError
QueryPerformanceFrequency
QueryPerformanceCounter
ResetEvent
SetEvent
WaitForSingleObject
CreateEventA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
HeapAlloc
GetProcessHeap
HeapFree
OpenProcess
FreeLibrary
CompareStringW
CompareStringA
GetLocalTime
UnmapViewOfFile
CloseHandle
SystemTimeToFileTime
GetLocaleInfoA
GetSystemInfo
lstrlenA
LoadLibraryA
GetProcAddress
GetCurrentThread
GetCurrentProcess
SetPriorityClass
SetThreadPriority
SetThreadPriorityBoost
SetThreadAffinityMask
GetVersionExA
Sleep
OpenFileMappingA
MapViewOfFile
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
GetConsoleMode
user32
MapWindowPoints
GetMessagePos
GetMessageTime
DestroyWindow
GetTopWindow
GetDlgItem
GetForegroundWindow
IsWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
LoadIconA
RegisterWindowMessageA
DestroyMenu
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
PostQuitMessage
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
LoadStringA
GetKeyState
PeekMessageA
ValidateRect
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
UnregisterClassA
gdi32
GetDeviceCaps
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
ExtTextOutA
SaveDC
RestoreDC
SetMapMode
PtVisible
RectVisible
TextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
DeleteObject
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
Sections
.text Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_GWDATA Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ