Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2564f960afa368070daaac2761970460.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.2564f960afa368070daaac2761970460.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.2564f960afa368070daaac2761970460.exe
-
Size
4.9MB
-
MD5
2564f960afa368070daaac2761970460
-
SHA1
9fac2e902b51218675848c70d60499e18371c1f6
-
SHA256
114495c7fa1ea6f573cde5e22b270c6e925574d5e86fb215d8209c17ffa8a2ee
-
SHA512
a1db9faba0fec84d8dc0f8d9aec97a6c7350026c8648c953cd0ac1af53a7c71d7b4889461320888afb61764be6fdbe4872dab8c4fa86aa3b6873312a3832d5b2
-
SSDEEP
98304:VUm8R1JNPz6CDhiednV/oydE5eDdoUTRPefqbbMxb5pl:Vl8HPz6CDhiedn98QKARPefq/M1l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.2564f960afa368070daaac2761970460.exe
Files
-
NEAS.2564f960afa368070daaac2761970460.exe.exe windows:5 windows x86
9db7e06f96474bede637e76367a40825
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
d3dx9_43
D3DXCreateTextureFromFileInMemoryEx
D3DXCreateVolumeTextureFromFileInMemoryEx
D3DXCreateCubeTextureFromFileInMemoryEx
D3DXCreateFontA
D3DXSaveSurfaceToFileA
D3DXGetImageInfoFromFileInMemory
D3DXCreateTextureFromFileInMemory
d3d9
Direct3DCreate9
kernel32
GetFileTime
ReadFile
WriteFile
GetFileSize
CreateFileW
DeleteCriticalSection
GetTimeZoneInformation
GetOEMCP
GetACP
GetTickCount
GetLocalTime
GetSystemTime
SystemTimeToFileTime
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetProcessHeap
SetEndOfFile
FlushFileBuffers
HeapReAlloc
VirtualAlloc
SetStdHandle
VirtualFree
HeapCreate
FormatMessageA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
FileTimeToLocalFileTime
CreateThread
CreateFileA
GetFileAttributesA
CreateDirectoryA
SetFileAttributesW
CreateDirectoryW
GetFileAttributesW
SetFilePointer
DeleteFileW
MoveFileW
GetTempPathA
GetTempPathW
GetCurrentDirectoryW
GetFullPathNameW
LocalFree
GetLastError
GetCurrentProcessId
FreeLibrary
ExitProcess
GetModuleHandleA
GetEnvironmentStringsW
GetComputerNameA
InterlockedIncrement
InitializeCriticalSection
SizeofResource
IsValidCodePage
GetStdHandle
SetHandleCount
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
GetModuleHandleW
GetFileType
HeapAlloc
HeapFree
RaiseException
RtlUnwind
GetStartupInfoA
LoadLibraryA
GetCommandLineA
UnhandledExceptionFilter
ExitThread
GetSystemTimeAsFileTime
InterlockedDecrement
SetUnhandledExceptionFilter
CreateFileMappingA
GetSystemInfo
MapViewOfFile
UnmapViewOfFile
MulDiv
VirtualQuery
DuplicateHandle
GetCurrentThread
TryEnterCriticalSection
InterlockedExchangeAdd
InterlockedExchange
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentThreadId
LockResource
LoadResource
FindResourceA
SetFileAttributesA
GetProcAddress
MoveFileA
DeleteFileA
SetConsoleTitleA
AllocConsole
Sleep
GlobalAlloc
GlobalUnlock
GlobalLock
GetCurrentProcess
TerminateProcess
GetCurrentDirectoryA
GetFullPathNameA
CreateEventA
SetEvent
OutputDebugStringA
OpenEventA
LeaveCriticalSection
EnterCriticalSection
CloseHandle
TerminateThread
WaitForSingleObject
GetVersionExA
GlobalMemoryStatusEx
CopyFileA
GetModuleFileNameA
MultiByteToWideChar
user32
EndDialog
SetTimer
KillTimer
EnableWindow
GetDlgItem
SetFocus
DialogBoxParamA
MessageBoxA
LoadIconA
GetClientRect
ClientToScreen
ShowCursor
PostQuitMessage
RegisterClassA
CreateWindowExA
GetActiveWindow
InvalidateRect
UpdateWindow
BeginPaint
EndPaint
LoadCursorA
LoadStringW
SetRect
AdjustWindowRect
GetWindowLongA
SetWindowPos
ClipCursor
ReleaseCapture
GetCursorPos
GetWindowRect
SetCapture
DefWindowProcA
SendMessageA
SetWindowLongA
SetWindowTextA
ShowWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
GetCaretBlinkTime
GetFocus
GetKeyState
OpenClipboard
GetClipboardData
CloseClipboard
GetAsyncKeyState
SwitchToThisWindow
gdi32
SetTextColor
SetBkColor
DeleteObject
GetTextExtentPoint32A
SetMapMode
CreateDIBSection
SetTextAlign
SelectObject
DeleteDC
GetDeviceCaps
CreateICA
CreateSolidBrush
GetStockObject
CreateFontA
CreateCompatibleDC
LineTo
MoveToEx
ExtTextOutA
CreatePen
advapi32
GetUserNameA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptAcquireContextA
CryptReleaseContext
CryptGenRandom
CryptExportKey
CryptDestroyKey
CryptGetUserKey
CryptEnumProvidersA
CryptGetProvParam
CryptAcquireContextW
RegOpenKeyExA
shell32
ShellExecuteA
SHGetFolderPathA
ole32
CoCreateInstance
CoInitializeEx
CoInitialize
oleaut32
SysAllocString
SysFreeString
iphlpapi
GetAdaptersInfo
dbghelp
MakeSureDirectoryPathExists
MiniDumpWriteDump
ws2_32
setsockopt
ioctlsocket
WSAGetLastError
socket
WSAStartup
ntohs
inet_ntoa
getsockname
gethostbyname
inet_addr
htons
connect
select
__WSAFDIsSet
bind
closesocket
shutdown
recv
send
dinput8
DirectInput8Create
crypt32
CertGetCertificateContextProperty
CryptDecodeObject
CertSetCertificateContextProperty
CertDuplicateCertificateContext
CertNameToStrW
CertFreeCertificateContext
CertCreateCertificateContext
CryptEncryptMessage
CryptEncodeObject
CertEnumCertificatesInStore
CertCloseStore
CertOpenStore
CertGetSubjectCertificateFromStore
CryptMsgControl
CryptMsgGetParam
CryptMsgClose
CryptMsgUpdate
CryptMsgOpenToDecode
CryptDecryptMessage
Sections
.text Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 710KB - Virtual size: 709KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 783KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 149KB - Virtual size: 149KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ