F:\17173project\CyouBrowser-src\build\Release\chrome.exe.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bb2695eddf7bfa4bc01eaaa233899bb0_NEAS.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bb2695eddf7bfa4bc01eaaa233899bb0_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
bb2695eddf7bfa4bc01eaaa233899bb0_NEAS
-
Size
1.3MB
-
MD5
bb2695eddf7bfa4bc01eaaa233899bb0
-
SHA1
4a6ca6f5880b763ab076616a023ec1458089db35
-
SHA256
5cd074871bc3d07dedf4b1c7f9399d9d6a938d6f583b04e2ced08591d209ebf8
-
SHA512
4f3a5e6ced8f4bd4558cfcb1d92a0c2b4b0ed04e26e14698a28c835d52b1b7530499ad666369aa740d2c08f5bc250f95701ca4cbdca83d92caf2a49cfb8e0a72
-
SSDEEP
24576:nh9X+sP02Oyo3CeZ3JJ3y/TNweiqVc1um7HAuJXmYAoPcF4:h9XUlieZDcNmEc1p7g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb2695eddf7bfa4bc01eaaa233899bb0_NEAS
Files
-
bb2695eddf7bfa4bc01eaaa233899bb0_NEAS.exe windows:5 windows x86 arch:x86
62c1403410f652b9e9d8bc760d6e443d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
kernel32
SetCurrentDirectoryW
DuplicateHandle
GetModuleHandleW
GetExitCodeProcess
WaitForSingleObject
SizeofResource
LockResource
LoadResource
FindResourceW
CreateFileW
GetSystemTimeAsFileTime
LocalFree
FreeLibrary
VirtualFree
SetFilePointer
ReadFile
VirtualAlloc
GetCurrentProcessId
GetTickCount
ReleaseMutex
SetLastError
CreateMutexW
WriteFile
OutputDebugStringA
FormatMessageA
MultiByteToWideChar
WideCharToMultiByte
CreateEventW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
lstrlenW
GetUserDefaultLangID
InterlockedExchange
QueryPerformanceCounter
QueryPerformanceFrequency
GetNativeSystemInfo
GetVersionExW
OpenProcess
GetProcessId
SetInformationJobObject
VirtualQueryEx
HeapSetInformation
ResumeThread
AssignProcessToJobObject
GetStdHandle
SetHandleInformation
LocalAlloc
UnmapViewOfFile
GetFileAttributesW
LoadLibraryExW
GetLongPathNameW
GetCurrentDirectoryW
QueryDosDeviceW
MapViewOfFile
CreateFileMappingW
GetLocaleInfoW
GetUserDefaultUILanguage
InterlockedExchangeAdd
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
RaiseException
CreateThread
GetCurrentThreadId
RtlCaptureStackBackTrace
TlsGetValue
TlsFree
TlsSetValue
TlsAlloc
GetSystemDirectoryW
GetWindowsDirectoryW
UnregisterWaitEx
RegisterWaitForSingleObject
SetEndOfFile
FlushFileBuffers
GetModuleHandleExW
GetQueuedCompletionStatus
CreateIoCompletionPort
PostQueuedCompletionStatus
InterlockedIncrement
ResetEvent
SetEvent
WaitForMultipleObjects
ReleaseSemaphore
InterlockedDecrement
RtlCaptureContext
CreateSemaphoreW
InitializeCriticalSection
GetThreadContext
SuspendThread
WaitNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
VirtualAllocEx
WriteProcessMemory
VirtualProtectEx
TerminateJobObject
SignalObjectAndWait
GetProcessHandleCount
GetFileType
VirtualFreeEx
CreateJobObjectW
CreateNamedPipeW
OpenEventW
SearchPathW
DebugBreak
ReadProcessMemory
GetThreadLocale
GetACP
LoadLibraryA
CreateFileA
GetTimeZoneInformation
GetStringTypeW
EncodePointer
DecodePointer
UnhandledExceptionFilter
HeapFree
ExitProcess
GetStartupInfoW
GetConsoleCP
GetConsoleMode
HeapReAlloc
GetFullPathNameW
HeapAlloc
GetProcessHeap
RtlUnwind
LCMapStringW
GetCPInfo
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapSize
GetOEMCP
IsValidCodePage
WriteConsoleW
SetStdHandle
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetDriveTypeW
CompareStringW
GetSystemInfo
VirtualQuery
GetModuleFileNameW
GetTempPathW
GetEnvironmentVariableW
CreateProcessW
CloseHandle
GetLastError
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedCompareExchange
Sleep
CreateRemoteThread
GetModuleHandleA
GetEnvironmentVariableA
GetCommandLineW
SetEnvironmentVariableA
LoadLibraryW
GetProcAddress
user32
CreateWindowStationW
GetProcessWindowStation
CreateDesktopW
SetProcessWindowStation
GetThreadDesktop
GetUserObjectInformationW
CharUpperW
CloseDesktop
CloseWindowStation
MessageBoxW
userenv
GetProfileType
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
winmm
timeGetTime
advapi32
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
RegCreateKeyExW
ConvertSidToStringSidW
GetTokenInformation
OpenProcessToken
CreateProcessAsUserW
GetTraceEnableLevel
GetTraceEnableFlags
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetEntriesInAclW
GetSecurityInfo
CreateWellKnownSid
CopySid
LookupPrivilegeValueW
EqualSid
DuplicateToken
DuplicateTokenEx
CreateRestrictedToken
SetThreadToken
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RevertToSelf
RegDisablePredefinedCache
RegisterTraceGuidsW
TraceEvent
UnregisterTraceGuids
GetTraceLoggerHandle
Exports
Exports
CrashForException
DumpProcess
DumpProcessWithoutCrash
InjectDumpForHangDebugging
InjectDumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine2
SetExperimentList3
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
SetPrinterInfo
Sections
.text Size: 709KB - Virtual size: 708KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 376KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ