Static task
static1
Behavioral task
behavioral1
Sample
NEAS.63a8162213b4a65c1072eb3ad49ef340.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.63a8162213b4a65c1072eb3ad49ef340.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.63a8162213b4a65c1072eb3ad49ef340.exe
-
Size
232KB
-
MD5
63a8162213b4a65c1072eb3ad49ef340
-
SHA1
2a320c70e6c6f99a270aa63a44e0fc2ffa37509d
-
SHA256
5ef57308e6877d69e74a9715aac1ef50eae29a45e3122fa65006164fb647cdb2
-
SHA512
319b88e04d7bd1869b0cfa3315adac502b7ea7b82acc5a5aa0dcc65e1ee814d07af2a6fd0ef49b24c418711ac7f98622d00aa7b4e3d96d2121ce19e4342aca6b
-
SSDEEP
6144:NOA2z6U/uXOqw0efC1C1mCBMSINSRqSsQLH5Adn:NOA2z6PbwNfmFSIKqSsPdn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.63a8162213b4a65c1072eb3ad49ef340.exe
Files
-
NEAS.63a8162213b4a65c1072eb3ad49ef340.exe.exe windows:4 windows x86
208a049d2d289eee2d600002b23bcd1b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
kernel32
SetEndOfFile
GetFullPathNameA
CreateFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
InterlockedIncrement
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
FlushFileBuffers
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
VirtualQuery
GetSystemTimeAsFileTime
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetStdHandle
SetEnvironmentVariableA
SetFilePointer
WriteFile
CreateDirectoryA
ReadFile
SetErrorMode
lstrcpyA
lstrcatA
lstrcmpA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
CreateThread
TerminateThread
WaitForSingleObject
GetTickCount
GetLocalTime
GetCurrentThreadId
OutputDebugStringA
SetEvent
OpenFileMappingA
OpenEventA
CreateFileMappingA
CreateEventA
MapViewOfFile
UnmapViewOfFile
GetPrivateProfileStringA
FindFirstFileA
FindNextFileA
FindClose
GetTimeZoneInformation
DeleteFileA
GetModuleHandleA
SetConsoleCtrlHandler
Sleep
GetComputerNameA
InterlockedDecrement
GlobalMemoryStatusEx
GetSystemInfo
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
RaiseException
MultiByteToWideChar
LocalAlloc
LocalFree
Process32First
Process32Next
GetModuleFileNameA
GetProcAddress
LoadLibraryA
FreeLibrary
CreateMutexA
GetLastError
GetCommandLineA
OpenThread
CloseHandle
GetCurrentProcess
TerminateProcess
SetFileAttributesA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
ExitProcess
user32
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowTextA
ValidateRect
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
GetForegroundWindow
DestroyMenu
GetTopWindow
DestroyWindow
GetMessagePos
LoadIconA
MapWindowPoints
GetKeyState
SetForegroundWindow
GetClientRect
UnregisterClassA
DispatchMessageA
TranslateMessage
GetMenu
PostMessageA
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
PostQuitMessage
SystemParametersInfoA
GetDlgItem
GetMessageA
PeekMessageA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSystemMetrics
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
LoadCursorA
UnhookWindowsHookEx
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
IsIconic
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowTextA
SendMessageA
MessageBoxA
GetMessageTime
gdi32
GetStockObject
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SetBkColor
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
SetTextColor
GetDeviceCaps
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
AdjustTokenPrivileges
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
shell32
ShellExecuteA
comctl32
ord17
shlwapi
PathFileExistsA
PathFindFileNameA
PathFindExtensionA
ole32
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
oleaut32
SysFreeString
SafeArrayDestroy
SafeArrayGetElement
VariantInit
SafeArrayGetUBound
SafeArrayGetLBound
VariantClear
VariantChangeType
SysAllocString
ws2_32
inet_addr
gethostbyname
htonl
socket
htons
sendto
WSAStartup
WSACleanup
ntohl
iphlpapi
GetPerAdapterInfo
GetAdaptersInfo
Sections
.text Size: 144KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ