Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4e7345a3fa19a2cea23eee00de96ff40.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4e7345a3fa19a2cea23eee00de96ff40.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4e7345a3fa19a2cea23eee00de96ff40.exe
-
Size
424KB
-
MD5
4e7345a3fa19a2cea23eee00de96ff40
-
SHA1
e80cccd2c3f9499c2c0aaea8b15f75a0eb3dc0bc
-
SHA256
c0b7e7816492a592b472911b7aff289c77083b06d0d0af7deb9424349c3c157a
-
SHA512
fa1be7fcb691ddb03636f7127d7bac5cd31171b2a346fea3a6cc96e7161b0aaa7c18ab71fac7556ebe518e1fa0ec591792e2dee3165a30e07cdb0bbb6734345d
-
SSDEEP
6144:2/V1zsXHuKCQHPsYzbFKsWu/djNL0WjObZ/CXvbrMSsQLH5AdC:2N1ztKCQHPNzbFnWwjNLzObdRSsPdC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.4e7345a3fa19a2cea23eee00de96ff40.exe
Files
-
NEAS.4e7345a3fa19a2cea23eee00de96ff40.exe.exe windows:4 windows x86
450961b2618f44b8617e48df035e5c9c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
CreateFileA
SetStdHandle
IsBadCodePtr
IsBadReadPtr
CompareStringW
SetEndOfFile
GetStringTypeW
GetStringTypeA
FlushFileBuffers
RaiseException
SetFilePointer
GetFileType
GetStdHandle
SetHandleCount
GetACP
GetOEMCP
LoadLibraryA
CompareStringA
Sleep
SetUnhandledExceptionFilter
DeleteFileA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
WideCharToMultiByte
IsBadWritePtr
VirtualAlloc
GetUserDefaultLangID
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
GetLastError
CreateThread
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateEventA
GetModuleHandleA
SetEvent
ResetEvent
WaitForSingleObject
CloseHandle
RtlUnwind
HeapAlloc
HeapFree
GetTimeZoneInformation
GetSystemTime
GetLocalTime
ExitProcess
TerminateProcess
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
GetStartupInfoA
GetCommandLineA
GetVersion
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
ResumeThread
TlsSetValue
ExitThread
HeapReAlloc
GetProcAddress
GetCurrentThreadId
TlsAlloc
SetLastError
TlsGetValue
HeapSize
ReadFile
WriteFile
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
user32
LoadIconA
ShowWindow
SetCursor
DefWindowProcA
PostQuitMessage
DestroyWindow
WaitMessage
DispatchMessageA
TranslateMessage
GetMessageA
PeekMessageA
UpdateWindow
SetFocus
CreateWindowExA
GetSystemMetrics
RegisterClassA
LoadCursorA
MsgWaitForMultipleObjects
gdi32
GetStockObject
advapi32
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
winmm
mmioOpenA
mmioRead
mmioClose
mmioAscend
mmioDescend
mmioSeek
timeGetTime
dinput
DirectInputCreateEx
dsound
ord1
ddraw
DirectDrawCreateEx
DirectDrawEnumerateExA
wininet
InternetSetFilePointer
HttpAddRequestHeadersA
InternetDial
InternetConnectA
InternetCloseHandle
InternetSetOptionA
InternetOpenA
HttpOpenRequestA
InternetReadFile
HttpSendRequestA
Sections
.text Size: 288KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ