Static task
static1
General
-
Target
NEAS.5cd5512f16e21db56c32c4a55342e6e0.exe
-
Size
3KB
-
MD5
5cd5512f16e21db56c32c4a55342e6e0
-
SHA1
69ea5ffb58c8f532fc8d8eafc65b1ce3f92a0ee3
-
SHA256
d2e955d80592701279fd5bebe6fd7cb17cf889813112cf08c951b297f657f1f6
-
SHA512
ad82b1691b42a531250b89f9a6298c300caecd47af80f19d78cfc7b206276c43e07135ac589e7b4543d21be9c14e40bb66571c2cca2838d4eaf1596ffc4b186d
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.5cd5512f16e21db56c32c4a55342e6e0.exe
Files
-
NEAS.5cd5512f16e21db56c32c4a55342e6e0.exe.sys windows:6 windows x86
e833bd1df48442a94c2758b0ea9fd9ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
ObfDereferenceObject
ObOpenObjectByPointer
MmGetSystemRoutineAddress
RtlInitUnicodeString
PsLookupProcessByProcessId
ZwClose
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwCreateJobObject
IofCompleteRequest
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
Sections
.text Size: 128B - Virtual size: 48B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 155B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 640B - Virtual size: 542B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 768B - Virtual size: 680B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ