Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3735b3f712e4e0e05a8d951e9c8ae0c0.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.3735b3f712e4e0e05a8d951e9c8ae0c0.dll
Resource
win10v2004-20230915-en
General
-
Target
NEAS.3735b3f712e4e0e05a8d951e9c8ae0c0.exe
-
Size
25KB
-
MD5
3735b3f712e4e0e05a8d951e9c8ae0c0
-
SHA1
d82b81f79d7f1a416b9ad858d39e12c4bab04947
-
SHA256
ed928206bfafbbfbd6c3eca2c28776eab0dd9b1dab2141e2654b8237eb4cf72f
-
SHA512
e3eb0557d3bd5e04e8bda6b369db48638a64c4b311f819055299a27520d23c7d9064b8bba44df4af9b6e9318b04f87c284a55c057fa37e1056b9254ffc3a2a75
-
SSDEEP
384:6koLqSMjsfpZQuFkJilqAeY4YcDkgTljamyqUFYSVeP8SjfcYb4Kug:6komSV1q2ibkgTl1yqUFrIfb4I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.3735b3f712e4e0e05a8d951e9c8ae0c0.exe
Files
-
NEAS.3735b3f712e4e0e05a8d951e9c8ae0c0.exe.dll windows:5 windows x86
5b8ea86312e7d75205328bf63b55f54d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntoskrnl.exe
IoFreeWorkItem
KeInitializeEvent
IoAllocateWorkItem
KeWaitForSingleObject
PsGetCurrentThreadId
PsGetCurrentProcessId
IoQueueWorkItem
IofCallDriver
IoAcquireRemoveLockEx
IoDeleteSymbolicLink
RtlInitUnicodeString
IoDeleteDevice
IoReleaseRemoveLockAndWaitEx
IoCreateSymbolicLink
IoInitializeRemoveLockEx
IoReleaseRemoveLockEx
MmMapLockedPagesSpecifyCache
KeSetEvent
ZwClose
IofCompleteRequest
RtlUnicodeStringToInteger
IoCsqInsertIrp
IoCsqRemoveNextIrp
KeAreApcsDisabled
MmGetSystemRoutineAddress
ZwOpenProcess
RtlEqualUnicodeString
PsSetLoadImageNotifyRoutine
PsRemoveCreateThreadNotifyRoutine
IoAllocateDriverObjectExtension
PsSetCreateThreadNotifyRoutine
PsSetCreateProcessNotifyRoutine
PsRemoveLoadImageNotifyRoutine
IoGetDriverObjectExtension
ExFreePoolWithTag
IoBuildDeviceIoControlRequest
IoCsqInitialize
ExAllocatePoolWithTag
ZwSetSecurityObject
ObOpenObjectByPointer
IoDeviceObjectType
IoCreateDevice
RtlGetDaclSecurityDescriptor
RtlGetSaclSecurityDescriptor
RtlGetGroupSecurityDescriptor
RtlGetOwnerSecurityDescriptor
_snwprintf
RtlLengthSecurityDescriptor
SeCaptureSecurityDescriptor
SeExports
IoIsWdmVersionAvailable
_wcsnicmp
RtlAddAccessAllowedAce
RtlLengthSid
memcpy
memset
wcschr
RtlAbsoluteToSelfRelativeSD
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
ZwOpenKey
ZwCreateKey
ZwQueryValueKey
ZwSetValueKey
RtlFreeUnicodeString
KeBugCheckEx
hal
KfReleaseSpinLock
KfAcquireSpinLock
KeGetCurrentIrql
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ