Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5f686b5476a899697c77cb658d69d040.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.5f686b5476a899697c77cb658d69d040.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.5f686b5476a899697c77cb658d69d040.exe
-
Size
369KB
-
MD5
5f686b5476a899697c77cb658d69d040
-
SHA1
edb317470b93c8abd11f57ed65eafcffb2083399
-
SHA256
45ae0db4eee75bcce1c92430be2ebc5d233755278de8dfe105bc48f400271222
-
SHA512
a425716dedb1b0c8deac430c51c4b0fc5640c2e75dd2da3bba6cb333a3637c1910120c0b77ef3286711abf1f56a468bc72861bffb9de77d3d8cb1c3df7ac45e0
-
SSDEEP
6144:Aix36FS+heEUGOhIbu+BTC/KfHbWBATuc2R4982sca5d7JuFhNNME:AUfGricTbq6XFW55dNuFbNME
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.5f686b5476a899697c77cb658d69d040.exe
Files
-
NEAS.5f686b5476a899697c77cb658d69d040.exe.exe windows:4 windows x86
6b758285b41003b711bb116a14856f91
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord2980
ord3076
ord2971
ord3825
ord3826
ord3820
ord3074
ord4075
ord4616
ord4418
ord3733
ord561
ord815
ord2550
ord6211
ord5297
ord5499
ord2627
ord986
ord520
ord4154
ord6113
ord2613
ord1131
ord617
ord5208
ord296
ord5261
ord4370
ord4847
ord4992
ord4704
ord2506
ord6048
ord4073
ord1767
ord4401
ord5237
ord2377
ord5157
ord6370
ord4347
ord5276
ord3793
ord4831
ord4435
ord2640
ord2047
ord6372
ord3744
ord5059
ord1720
ord5257
ord2438
ord2116
ord5273
ord4621
ord4419
ord3592
ord324
ord641
ord4229
ord5285
ord825
ord823
ord1817
ord4233
ord4690
ord3053
ord3060
ord6332
ord2502
ord2534
ord5239
ord5736
ord1739
ord5573
ord3167
ord5649
ord4414
ord4947
ord4852
ord2391
ord4381
ord3449
ord3193
ord6076
ord6171
ord4617
ord4420
ord652
ord338
ord4817
ord4128
ord4292
ord6115
ord4608
ord4607
ord1937
ord4268
ord4583
ord4893
ord5070
ord4335
ord4343
ord4717
ord4884
ord4525
ord4539
ord4537
ord4520
ord4523
ord4518
ord4958
ord4955
ord4103
ord6051
ord1768
ord5236
ord5286
ord3743
ord1719
ord5256
ord4426
ord813
ord560
ord2527
ord1165
ord2854
ord3067
ord1143
ord5783
ord5784
ord3688
ord3621
ord3658
ord2406
ord1634
ord3568
ord800
ord861
ord540
ord2362
ord692
ord2294
ord2637
ord5949
ord860
ord6193
ord3087
ord755
ord470
ord3257
ord3569
ord609
ord4270
ord2567
ord3397
ord567
ord1764
ord6362
ord2405
ord2016
ord4214
ord2573
ord4395
ord3634
ord1834
ord4237
ord2715
ord2382
ord3054
ord5094
ord5097
ord4298
ord3345
ord5006
ord975
ord5468
ord3398
ord2874
ord2873
ord4146
ord4072
ord5233
ord5278
ord2641
ord1658
ord4430
ord4421
ord807
ord794
ord674
ord554
ord527
ord366
ord2486
ord2619
ord2618
ord5879
ord5867
ord2112
ord4451
ord2107
ord5248
ord2072
ord5878
ord6063
ord3477
ord4718
ord4770
ord4158
ord4143
ord2577
ord6150
ord2522
ord4359
ord4051
ord5467
ord4116
ord2381
ord5079
ord1702
ord1707
ord4398
ord5230
ord6365
ord5275
ord5254
ord2436
ord3717
ord796
ord529
ord765
ord4260
ord3289
ord5996
ord2109
ord2100
ord4448
ord4294
ord3693
ord2015
ord4392
ord3577
ord616
ord3290
ord4360
ord5080
ord1703
ord1708
ord5058
ord5244
ord3725
ord4263
ord2403
ord4213
ord2570
ord3737
ord818
ord2144
ord1230
ord1761
ord640
ord323
ord1172
ord3566
ord1633
ord5781
ord2371
ord1900
ord4709
ord1683
ord2520
ord5284
ord4433
ord2046
ord4425
ord771
ord1008
ord496
ord4254
ord1899
ord5155
ord5156
ord5154
ord4899
ord4736
ord4970
ord4942
ord4352
ord4371
ord4848
ord5283
ord4829
ord489
ord768
ord2359
ord4253
ord2350
ord2293
ord5977
ord6330
ord6107
ord858
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5303
ord4692
ord4074
ord2717
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord4604
ord4606
ord4390
ord4609
ord1569
msvcrt
?terminate@@YAXXZ
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
__CxxFrameHandler
sqrt
fabs
_ftol
fclose
fread
malloc
rewind
ftell
fseek
fopen
_controlfp
sprintf
_exit
_XcptFilter
kernel32
GetStartupInfoW
GetModuleHandleW
GetModuleFileNameA
VirtualQuery
GetTimeZoneInformation
GetCurrentThreadId
GetEnvironmentVariableA
GetTimeFormatW
GetDateFormatA
GetStdHandle
GetLastError
GlobalUnlock
user32
FindWindowW
PtInRect
SetTimer
KillTimer
GetSysColor
LoadBitmapW
ToAsciiEx
DestroyCaret
SetDlgItemTextA
RegisterWindowMessageW
IsZoomed
SendMessageW
GetWindowRect
CopyRect
LoadCursorW
GetDC
GetClientRect
SetCursor
EnableWindow
UpdateWindow
SendDlgItemMessageA
gdi32
BitBlt
CreateCompatibleDC
GetObjectW
ExtTextOutW
GetPixel
TextOutW
Pie
Arc
CreateHatchBrush
Rectangle
CreatePen
advapi32
GetLengthSid
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 304KB - Virtual size: 301KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ