Static task
static1
Behavioral task
behavioral1
Sample
NEAS.02f86b825136d235cd47e51bbdb96ef0_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.02f86b825136d235cd47e51bbdb96ef0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.02f86b825136d235cd47e51bbdb96ef0_JC.exe
-
Size
789KB
-
MD5
02f86b825136d235cd47e51bbdb96ef0
-
SHA1
89b873dc0d19aad63fb2dee682c1439422ee161f
-
SHA256
0c95187c1252f6a605aa779d268d6a50fc23167a153873b8e63c096a184e0456
-
SHA512
9cd7f3276659e7be526b77bf9ca26e1b5df4619dd08b589eef4616ccbe97a5b319907e5b50028fa2c7b2358f9e849e7e3e16333f2d8ebfc90303a8eeb636e5e1
-
SSDEEP
12288:ox1n0YqOuSP+QlauwaN14U1hA1bA2+8byETqtVsPDaYQN3uD:ox1We+Qllw3UI+8bBHquD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.02f86b825136d235cd47e51bbdb96ef0_JC.exe
Files
-
NEAS.02f86b825136d235cd47e51bbdb96ef0_JC.exe.exe windows:5 windows x86
b20153ce7820485ba0148fb358836f2a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
GetFileSizeEx
GetFileTime
SetErrorMode
GetStartupInfoW
HeapFree
RaiseException
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetSystemTimeAsFileTime
ExitThread
CreateThread
HeapAlloc
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LCMapStringA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetProcessHeap
SetEnvironmentVariableA
GetTickCount
GlobalFlags
WritePrivateProfileStringW
lstrlenA
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
FileTimeToLocalFileTime
FileTimeToSystemTime
GetModuleHandleA
GetThreadLocale
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFindAtomW
CompareStringW
LoadLibraryA
GetVersionExA
SuspendThread
SetThreadPriority
GlobalGetAtomNameW
GlobalAddAtomW
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
CompareStringA
lstrcmpW
FormatMessageW
LocalFree
SetLastError
GetLocaleInfoW
GetVersionExW
InterlockedDecrement
GetProcAddress
lstrcpynW
FreeResource
GlobalLock
GlobalUnlock
GlobalFree
MulDiv
CreateEventW
ResumeThread
GlobalAlloc
SetEvent
ResetEvent
GetFileAttributesA
ExpandEnvironmentStringsW
GetModuleHandleW
GetTempPathW
GetTempFileNameW
WaitForSingleObject
GetExitCodeProcess
LoadLibraryW
FreeLibrary
CreateTimerQueueTimer
InterlockedExchangeAdd
InterlockedExchange
DeleteTimerQueueTimer
CreateFileW
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
SetUnhandledExceptionFilter
GetModuleFileNameW
Sleep
CloseHandle
CreateMutexW
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
SetHandleCount
GetLastError
user32
InflateRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
CharNextW
CreateDialogIndirectParamW
EndDialog
SetCapture
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableW
MessageBeep
GetNextDlgTabItem
GetNextDlgGroupItem
SetWindowContextHelpId
MapDialogRect
SetWindowTextW
IsDialogMessageW
SendDlgItemMessageW
SendDlgItemMessageA
IsChild
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
GetClassInfoExW
PostThreadMessageW
AdjustWindowRectEx
ScreenToClient
DeferWindowPos
PtInRect
CallWindowProcW
SystemParametersInfoA
GetWindowPlacement
ShowOwnedPopups
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
CheckMenuItem
UnpackDDElParam
ReuseDDElParam
LoadMenuW
DestroyMenu
WinHelpW
SetWindowPos
GetWindowThreadProcessId
IsWindowEnabled
EqualRect
GetDlgItem
DrawIcon
DeleteMenu
SendMessageW
GetSystemMenu
SetWindowLongW
GetDlgCtrlID
GetKeyState
SetCursor
PeekMessageW
GetCapture
ReleaseCapture
LoadAcceleratorsW
GetParent
SetActiveWindow
IsWindowVisible
InsertMenuItemW
CreatePopupMenu
GetClassInfoW
IntersectRect
OffsetRect
SetRectEmpty
GetMenu
UnregisterClassW
RegisterClipboardFormatW
GetMenuItemInfoW
GetSysColorBrush
CharUpperW
SystemParametersInfoW
RegisterClassW
IsIconic
GetClientRect
UpdateWindow
GetActiveWindow
EnableWindow
LoadIconW
EnableMenuItem
SetFocus
SetForegroundWindow
ShowWindow
GetSystemMetrics
GetClassNameW
EnumChildWindows
GetSysColor
AppendMenuW
MoveWindow
GetWindowRect
MessageBoxW
FillRect
ReleaseDC
GetDC
CopyRect
InvalidateRect
SetRect
DefWindowProcW
CreateWindowExW
RegisterClassExW
LoadCursorW
DestroyIcon
RegisterWindowMessageW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
PostMessageW
TranslateAcceleratorW
IsWindow
GetLastActivePopup
BringWindowToTop
SetMenu
GetDesktopWindow
GetWindow
GetWindowLongW
gdi32
CreatePatternBrush
GetMapMode
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
CreateFontIndirectW
GetTextExtentPoint32W
GetPixel
GetWindowExtEx
GetViewportExtEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetTextColor
GetBkColor
GetStockObject
GetRgnBox
CreateRectRgnIndirect
GetObjectW
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
DeleteObject
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
BitBlt
CreateSolidBrush
PtVisible
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
RegCreateKeyExW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegCreateKeyW
RegSetValueExW
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
shell32
ShellExecuteExW
ShellExecuteW
Shell_NotifyIconW
DragFinish
DragQueryFileW
shlwapi
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathFindExtensionW
oledlg
OleUIBusyW
ole32
CoInitialize
CreateStreamOnHGlobal
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoUninitialize
oleaut32
SysAllocString
SysAllocStringByteLen
SysStringByteLen
VariantChangeType
OleLoadPicture
SysStringLen
VariantTimeToSystemTime
SystemTimeToVariantTime
SafeArrayDestroy
OleCreateFontIndirect
SysAllocStringLen
VariantCopy
VariantClear
VariantInit
SysFreeString
urlmon
URLOpenBlockingStreamW
URLDownloadToFileW
oleacc
LresultFromObject
CreateStdAccessibleObject
wininet
InternetConnectW
HttpSendRequestW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
HttpQueryInfoW
InternetQueryDataAvailable
HttpOpenRequestW
Sections
.text Size: 455KB - Virtual size: 454KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ