Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8674713c95980829e2bd67fe2fe727b0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.8674713c95980829e2bd67fe2fe727b0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.8674713c95980829e2bd67fe2fe727b0_JC.exe
-
Size
488KB
-
MD5
8674713c95980829e2bd67fe2fe727b0
-
SHA1
a4fec1edad963f59a7ad99429120d2218401e087
-
SHA256
1bb3354345b993667a19cd3e1c776143d321fc15e03465327d74cb8e729835f8
-
SHA512
ba8d6dde7a09fbfbbfd11a6e33d71272ffb93949d51e2970164179ea0d0aa8df8d1fb6837189d072a61a986e596ba79788d169946929c69e2461d2537dc22738
-
SSDEEP
12288:4xu1hfrirQFnaj6+NgCDskKwkihMtGvk4aGCOe1PaG3:4xujrir/kNGCR1PaG3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.8674713c95980829e2bd67fe2fe727b0_JC.exe
Files
-
NEAS.8674713c95980829e2bd67fe2fe727b0_JC.exe.exe windows:4 windows x86
eb37a9faf9568cde10c777f38840616a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdiplus
GdipCloneImage
GdipAlloc
GdipDrawImageRectRectI
GdipCreateFromHDC
GdipSetImageAttributesColorMatrix
GdipFree
GdipCreateBitmapFromHBITMAP
GdipGetImageHeight
GdipGetImageWidth
GdipDisposeImage
GdipDeleteGraphics
GdiplusShutdown
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdiplusStartup
dinput8
DirectInput8Create
kartres
?GetString@@YGPBDPBDH@Z
?InitKartRes@@YG_NPBD@Z
kernel32
SetErrorMode
RtlUnwind
GetDriveTypeA
HeapAlloc
HeapFree
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
TerminateProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetFullPathNameA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GlobalFlags
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
SetLastError
MulDiv
GlobalAlloc
FormatMessageA
LocalFree
GetModuleFileNameA
InterlockedDecrement
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetProcAddress
GlobalLock
GlobalUnlock
FreeResource
GlobalFree
VirtualProtect
ReadFile
CreateFileA
WriteFile
CloseHandle
lstrlenA
lstrcmpiA
GetVersion
GetLastError
MultiByteToWideChar
WideCharToMultiByte
GetModuleHandleA
GetPrivateProfileStringA
WritePrivateProfileStringA
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
ExitProcess
user32
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
wsprintfA
ReleaseDC
GetDC
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
GetDlgItemTextA
RegisterWindowMessageA
WinHelpA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
GetSysColor
AdjustWindowRectEx
ScreenToClient
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
CopyRect
PtInRect
GetDesktopWindow
CreateDialogIndirectParamA
DestroyWindow
GetNextDlgTabItem
EndDialog
SetWindowPos
ShowWindow
GetCapture
GetActiveWindow
SetActiveWindow
GetFocus
SetFocus
PostMessageA
GetDlgItem
IsWindowEnabled
SetWindowLongA
KillTimer
GetWindow
LoadImageA
IsWindow
RedrawWindow
GetSystemMetrics
LoadIconA
SetTimer
GetClientRect
DestroyMenu
LoadCursorA
GetWindowTextLengthA
GetSysColorBrush
GetWindowRect
IsIconic
SendMessageA
DrawIcon
GetKeyNameTextA
GetWindowLongA
GetParent
EnableWindow
MessageBoxA
gdi32
DeleteDC
GetStockObject
TextOutA
SetWindowExtEx
RectVisible
PtVisible
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
SetMapMode
ScaleWindowExtEx
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
DeleteObject
ExtTextOutA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoUninitialize
CoInitialize
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 320KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ