Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7144dc6dbf4e36388138de4a608978b0_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.7144dc6dbf4e36388138de4a608978b0_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.7144dc6dbf4e36388138de4a608978b0_JC.exe
-
Size
46KB
-
MD5
7144dc6dbf4e36388138de4a608978b0
-
SHA1
0cbbf8730d86cff365d0a48a92425de7d4173345
-
SHA256
6f1d7d6f34a02c0bbea6b3f8a75ad943b61eab1fa8bbfb38fae4637a5f234018
-
SHA512
3a95ba754b9e5137c2c79d40a50b450281b09689111f238685e6d02e6c9f25044c1f84f22348700bddce438cf362ed2b0b6c1409004c77c523e98fed23dbef7f
-
SSDEEP
768:zQ3n4ZtMHykJk+1ALBCGgF2NuC9IuSLeXmMQGPL4vzZq2o9W7GsxBbPr:+vYB1gsNdIuodPGCq2iW7z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.7144dc6dbf4e36388138de4a608978b0_JC.exe
Files
-
NEAS.7144dc6dbf4e36388138de4a608978b0_JC.exe.exe windows:4 windows x86
133920d15d1c227166476a5c577a7a63
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
gdi32
GetTextMetricsA
SelectObject
ExtTextOutA
kernel32
GetFileTime
GetModuleFileNameA
FileTimeToSystemTime
GetDateFormatA
CloseHandle
OpenFile
DeleteCriticalSection
WaitForSingleObject
GetProcAddress
LoadLibraryA
EnterCriticalSection
GetFileSize
GetLocaleInfoA
lstrcatA
GetEnvironmentVariableA
GetSystemDirectoryA
lstrcmpiA
GlobalLock
GlobalReAlloc
GlobalFlags
GlobalUnlock
GlobalAlloc
GlobalFree
lstrlenA
lstrcpyA
FreeLibrary
InitializeCriticalSection
CreateEventA
SetEvent
LeaveCriticalSection
GetStartupInfoA
GetModuleHandleA
user32
GetClientRect
GetParent
MapWindowPoints
EnumChildWindows
SetDlgItemTextA
SendDlgItemMessageA
CheckDlgButton
InflateRect
GetClassNameA
SetWindowPos
RemovePropA
CallWindowProcA
BringWindowToTop
MoveWindow
DestroyWindow
MessageBeep
GetPropA
GetKeyState
ShowWindow
SetPropA
GetWindowTextA
PostQuitMessage
PostMessageA
SendMessageA
LoadCursorA
DefWindowProcA
LoadIconA
GetMessageA
RegisterClassA
CreateDialogParamA
DispatchMessageA
IsDialogMessageA
TranslateMessage
GetDC
GetWindowLongA
SetWindowLongA
EndDialog
ReleaseDC
CopyRect
IsDlgButtonChecked
GetDlgItem
EnableWindow
SetFocus
LoadStringA
wsprintfA
GetDlgItemTextA
MessageBoxA
DialogBoxParamA
UpdateWindow
msvcrt
_strrev
_strupr
strcpy
strcmp
_controlfp
_except_handler3
__p__fmode
__p__commode
__set_app_type
__setusermatherr
_initterm
_adjust_fdiv
_acmdln
exit
__getmainargs
_exit
memmove
_XcptFilter
strncmp
memcpy
_strnicmp
_findclose
_findnext
_findfirst
malloc
_beginthread
_endthread
memset
strtok
strcat
strlen
_strlwr
_stricmp
free
strstr
advapi32
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegEnumValueA
RegDeleteValueA
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�b�"�u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE