Static task
static1
Behavioral task
behavioral1
Sample
NEAS.8616b97b78f7b7598b7697fe826c0760_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.8616b97b78f7b7598b7697fe826c0760_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.8616b97b78f7b7598b7697fe826c0760_JC.exe
-
Size
264KB
-
MD5
8616b97b78f7b7598b7697fe826c0760
-
SHA1
d875abc5e064bcf59432b56c0621a6a080da7958
-
SHA256
566b40dca12837453bf47cefbabee10cc90be8e2cf973150c921e6bfb2434a01
-
SHA512
8423c49e8955dbda0112945ed0b8b0b99194b3e59e7deee61997afd036f8204da632af1ce72cac510c74894e880be42427457854241fad088acf346b3ebbf857
-
SSDEEP
6144:Uh12Ka/byoGjJXnDt3hjXn0UfN0sdzIJhZxpB2KPgZzOHix:UT2KAbyoCJXnDt3hjXn0CN0sdzIJhZxq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.8616b97b78f7b7598b7697fe826c0760_JC.exe
Files
-
NEAS.8616b97b78f7b7598b7697fe826c0760_JC.exe.exe windows:4 windows x86
fa62a133fbb083ae0485ee62ea4f7509
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfcager
ord111
ord113
ord114
axgear
ord49
ord45
ord61
ord75
ord59
ord19
ord34
ord181
ord183
ord32
crpe32
ord30
adbapi
ord113
ord114
ord116
ord102
ord4
ord115
ord2
ord3
ord104
adbtwl
ord240
adbwnfg
ord125
ord407
ord345
ord460
ord700
ord210
ord435
ord1145
ord1148
ord1125
ord105
ord172
ord182
ord100
ord192
ord341
ord130
ord445
ord437
ord405
adbwnfs
ord720
ord715
ord221
ord223
ord215
ord201
ord1065
ord780
ord920
ord530
ord481
ord471
ord517
ord515
ord231
ord131
ord460
ord181
ord315
ord175
ord171
ord101
ord161
ord850
ord211
ord1035
ord922
ufxtwl
ord404
ord55
ord100
ord52
ord51
ord451
ord53
ord56
ord57
ord413
ord104
ord412
ord54
ord2
ord50
ord67
ord409
ord68
ord402
ord403
ufxtools
ord2011
ord1033
ord1021
ord1020
ord1034
ord1038
ord2145
ord330
ord320
ord2079
ord32
ord37
ord35
ord230
ord220
ord2074
ord2101
ord825
ord102
ord100
ord2078
ord29
ord23
ord25
ord27
ord24
ord31
ord2201
ord85
ord2202
ord200
ord824
ord2200
ord828
ord2513
ord2522
ord2500
ord2501
ord202
ord201
ord20
ord36
ord30
ord42
ord2204
ord12221
ord2220
ord2
ord2223
ord12222
ord11
ord10
ord1006
ord1002
ord1007
ord1003
ord1005
ord1004
ord1000
ord1001
ord2502
ord2523
ord2519
ord2520
ord2508
ord2515
ord2517
ord2514
ord101
ord2516
adbwnfi
ord1175
ord1177
mfc42
ord813
ord560
ord1726
ord4961
ord4964
ord4890
ord4723
ord4349
ord4341
ord5076
ord4273
ord1945
ord4613
ord4614
ord1200
ord1783
ord3573
ord6403
ord6216
ord6131
ord5037
ord4508
ord3522
ord4892
ord4370
ord2535
ord4588
ord2938
ord1199
ord922
ord4432
ord2091
ord5260
ord1725
ord3748
ord5281
ord5240
ord6054
ord4108
ord4960
ord4963
ord4524
ord4529
ord4526
ord4543
ord4545
ord4531
ord4889
ord4347
ord4340
ord4533
ord4589
ord4420
ord4823
ord4426
ord4623
ord6175
ord6080
ord3198
ord3454
ord4387
ord2399
ord4858
ord4953
ord5653
ord4899
ord2627
ord5265
ord4376
ord4998
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord324
ord641
ord4234
ord800
ord2642
ord2915
ord4160
ord540
ord3092
ord4710
ord4853
ord5802
ord6334
ord858
ord2645
ord4224
ord825
ord1168
ord795
ord5981
ord6215
ord2302
ord6199
ord4047
ord823
ord3571
ord3626
ord3663
ord2414
ord1641
ord1146
ord4299
ord2864
ord2086
ord6055
ord1776
ord5290
ord3402
ord4424
ord3721
ord567
ord4685
ord4681
ord1842
ord4242
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord5472
ord3403
ord2879
ord2878
ord4151
ord4077
ord5237
ord2649
ord1665
ord4436
ord4427
ord674
ord554
ord366
ord796
ord807
ord5282
ord5252
ord975
ord2494
ord1576
ord2626
ord6625
ord2117
ord3521
ord4457
ord2652
ord6329
ord5852
ord5484
ord2884
ord1669
ord6146
ord4317
ord5885
ord860
ord537
ord4413
ord6402
ord4163
ord535
ord2818
ord861
ord2813
ord812
ord4277
ord4129
ord2763
ord6144
ord559
ord2860
ord2859
ord686
ord384
ord3484
ord6442
ord1233
ord3294
ord3874
ord6069
ord4284
ord1133
ord1930
ord4083
ord6880
ord640
ord613
ord2096
ord2408
ord2405
ord6157
ord289
ord323
ord6282
ord939
ord5710
ord941
ord924
ord926
ord5789
ord6283
ord4275
ord755
ord470
ord1175
ord1640
ord5785
ord3072
ord2379
ord4615
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord561
ord815
ord4610
ord986
ord520
ord4159
ord5943
ord2725
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
msvcrt
_setmbcp
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
?terminate@@YAXXZ
_except_handler3
_onexit
__dllonexit
floor
memcmp
qsort
atol
atof
strncmp
strcat
atoi
strcmp
strcpy
memcpy
sprintf
_ftol
_exit
memset
strtok
strlen
__CxxFrameHandler
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
FileTimeToSystemTime
GetLocalTime
SystemTimeToFileTime
MulDiv
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
GetStartupInfoA
user32
IsWindow
ReleaseDC
GetDC
MessageBoxA
WinHelpA
SetWindowLongA
GetSystemMetrics
GetParent
IsWindowVisible
InvalidateRect
EqualRect
LoadBitmapA
SetRect
PeekMessageA
TranslateMessage
DispatchMessageA
GetDialogBaseUnits
EnableWindow
SendMessageA
GetDesktopWindow
wsprintfA
GetClientRect
SetTimer
KillTimer
LoadCursorA
GetSysColor
GetWindowRect
PostQuitMessage
gdi32
StretchBlt
BitBlt
GetPixel
SetPixel
GetObjectA
CreateCompatibleBitmap
GetBitmapBits
CreateBitmapIndirect
GetDeviceCaps
CreateDIBitmap
DeleteObject
GetTextExtentPoint32A
CreateSolidBrush
CreateCompatibleDC
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
comctl32
ImageList_Draw
ImageList_AddMasked
ole32
CoCreateInstance
CoUninitialize
CoInitialize
CLSIDFromProgID
oleaut32
SafeArrayCreate
SafeArrayPutElement
SysAllocString
VariantInit
VariantClear
SysFreeString
Sections
.text Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ