Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4eea5e9311a6f5c7deb81b74d4c2bba0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4eea5e9311a6f5c7deb81b74d4c2bba0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4eea5e9311a6f5c7deb81b74d4c2bba0.exe
-
Size
1.8MB
-
MD5
4eea5e9311a6f5c7deb81b74d4c2bba0
-
SHA1
bc3285a4b9a9d827f80a01bd195b0f47d37c984a
-
SHA256
5370534f542126261d8fcc2e7b6a9e053924ac7dda7081a38701f2944426256e
-
SHA512
9cff1b8b9a71efcf748e4698896bbc951139cdbf5d7f8f29cae37e1dfdf8cd95be39c4dc0a0a215b69a24b8995e0000f43f5fd55dab7c95d8d653446c7bb5449
-
SSDEEP
12288:xV/p3dOEwiENP0aZxikoCYJgEWNMu51JvbNf95/Ldeer:f/p3dOTrPk2d5p/Ld
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.4eea5e9311a6f5c7deb81b74d4c2bba0.exe
Files
-
NEAS.4eea5e9311a6f5c7deb81b74d4c2bba0.exe.exe windows:4 windows x86
f5d4fa2de623c1cf7227763e7b9c76e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
dx8vb
ord131
ord132
ord133
ord109
msvbvm60
ord582
ord583
ord585
ord586
ord588
MethCallEngine
ord620
ord516
ord517
ord518
ord626
ord519
ord593
ord300
ord301
ord595
ord596
ord303
ord598
ord306
ord520
ord307
ord522
ord309
ord523
ord524
ord631
ord525
ord632
ord526
EVENT_SINK_AddRef
ord527
ord529
ord561
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord606
ord607
ord714
ord530
ord608
ord317
ord716
ord318
ord533
ord534
ProcCallEngine
ord535
ord644
ord537
ord645
ord570
ord648
ord571
ord572
ord573
ord681
ord685
ord100
ord579
ord610
ord612
ord613
ord614
ord616
ord617
ord618
ord619
ord650
ord580
ord581
Sections
.text Size: 1.8MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ