Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c5e3fdaaed026a827420e51eb29e5f70.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.c5e3fdaaed026a827420e51eb29e5f70.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.c5e3fdaaed026a827420e51eb29e5f70.exe
-
Size
45KB
-
MD5
c5e3fdaaed026a827420e51eb29e5f70
-
SHA1
846ba107cb9a39d29cd3acbd1ed0d121f090cfd4
-
SHA256
1a06ff7e413e069bbbb0f0b44d378b63b30084683cb0a1df51d6137f745e2add
-
SHA512
4f68e079ec7f9ffddd47108c2271a40edcd7777b6adcf6b6bc2f4e3a7f4d74ba3bdb59736b5541221299a498920f64d65ebbd7c8c4484b65856f074e5a729139
-
SSDEEP
768:rKgGXefEhguK0iMG45iVDCuorZv1LWAPizQy0WljCljBe6/DQlr4SD1KK:+gJfsg30XB5iDCuW1LWAPi1rj8jUMQ9P
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.c5e3fdaaed026a827420e51eb29e5f70.exe
Files
-
NEAS.c5e3fdaaed026a827420e51eb29e5f70.exe.exe windows:5 windows x86
1d3b508a0a3c1db621a13364146d2a4f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlCreateQueryDebugBuffer
RtlQueryProcessDebugInformation
RtlDestroyQueryDebugBuffer
ZwQueryInformationFile
ZwCreateFile
ZwWriteFile
strlen
swprintf
wcsrchr
_wcsicmp
ZwFsControlFile
ZwCreateSection
ZwMapViewOfSection
ZwImpersonateThread
ZwFlushVirtualMemory
ZwUnmapViewOfSection
ZwCreateSymbolicLinkObject
ZwLoadDriver
ZwSetSecurityObject
ZwReadFile
RtlRandom
strrchr
LdrFindResource_U
LdrAccessResource
ZwSetEvent
RtlEqualUnicodeString
ZwCreateEvent
ZwOpenThread
ZwOpenProcess
ZwQuerySystemInformation
LdrFindEntryForAddress
RtlNtStatusToDosError
memset
wcslen
ZwSetValueKey
ZwCreateKey
wcstoul
RtlInitUnicodeString
RtlFreeUnicodeString
RtlStringFromGUID
ZwQueryKey
RtlComputeCrc32
sprintf
RtlIpv4AddressToStringA
ZwClose
ZwOpenKey
ZwQueryValueKey
ZwSuspendThread
ZwQueryInformationThread
_stricmp
ZwResumeThread
ZwSetContextThread
ZwWriteVirtualMemory
ZwSetInformationFile
ZwDelayExecution
ZwWaitForSingleObject
ZwGetContextThread
RtlExitUserThread
RtlCreateUserThread
ZwDuplicateObject
RtlDosPathNameToNtPathName_U
ZwOpenFile
ZwQueryInformationProcess
RtlAdjustPrivilege
RtlImageNtHeader
memcpy
_allshr
kernel32
LoadLibraryW
ExitProcess
GetTickCount
FreeLibrary
GetProcAddress
GetVersion
GetModuleHandleW
HeapFree
GetProcessHeap
HeapAlloc
GetSystemTimeAsFileTime
GetLastError
BindIoCompletionCallback
GetSystemDefaultLangID
advapi32
MD5Final
MD5Update
MD5Init
ws2_32
WSAStartup
WSASend
WSARecv
WSAIoctl
bind
closesocket
WSAGetLastError
WSASocketW
WSACleanup
rpcrt4
UuidCreateSequential
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ