Static task
static1
Behavioral task
behavioral1
Sample
NEAS.7cdf773b62c5182bff8268d209e30c00.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.7cdf773b62c5182bff8268d209e30c00.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.7cdf773b62c5182bff8268d209e30c00.exe
-
Size
161KB
-
MD5
7cdf773b62c5182bff8268d209e30c00
-
SHA1
2968f33e4959843629254ecd8bd19d84f25a7a6d
-
SHA256
1fd051a8934f6f4fcf4a9878552d1d791f072a58424abfde272b5317c04deaba
-
SHA512
6e736578a02b7b4f0a4fdb9503682fadd3d73fec75d1afd64c5647309cb98c150fed416b1b8c7b2257318ea3b39255def0eeaea044a2bc7af64cc89a877e5bde
-
SSDEEP
3072:QdsMOSr9i8CnUcv38LPzSI5NRJutblEM9rKikr8lM5FjjqfCM4wOtHv6R:5ogRUWzI5NRcVlRAikIExj05R
Malware Config
Signatures
Files
-
NEAS.7cdf773b62c5182bff8268d209e30c00.exe.exe windows:4 windows x86
7c323bb2cf2b72b35ac7fa910100cec0
Code Sign
03:c7:8f:37:db:92:28:df:3c:bb:1a:ad:82:fa:67:10Certificate
IssuerOU=VeriSign Commercial Software Publishers CA,O=VeriSign\, Inc.,L=InternetNot Before09-04-1996 00:00Not After07-01-2004 23:59SubjectOU=VeriSign Commercial Software Publishers CA,O=VeriSign\, Inc.,L=Internetfc:a4:a5:9f:2c:0f:c0:b9:03:98:33:1b:7b:54:54:1dCertificate
IssuerOU=VeriSign\, Inc.+OU=VeriSign Time Stamping Service Root+OU=NO LIABILITY ACCEPTED\, (c)97 VeriSign\, Inc.,O=VeriSign Trust NetworkNot Before16-11-1999 00:00Not After06-01-2004 23:59SubjectCN=VeriSign Time Stamping Service CA SW1,OU=VeriSign Trust Network+OU=www.verisign.com/repository/RPA Incorp. by Ref.\,LIAB.LTD(c)98,O=VeriSign\, Inc.Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
75:f2:8e:f8:a8:fb:ea:6d:11:52:97:14:95:4b:65:5cCertificate
IssuerOU=VeriSign Commercial Software Publishers CA,O=VeriSign\, Inc.,L=InternetNot Before04-04-2000 00:00Not After17-04-2001 23:59SubjectCN=Microsoft Corporation,OU=VeriSign Commercial Software Publishers CA+OU=www.verisign.com/repository/RPA Incorp. by Ref.\,LIAB.LTD(c)98+OU=Digital ID Class 3 - Microsoft Software Validation v2+OU=Microsoft Corporation,O=VeriSign\, Inc.,L=Internet+L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageKeyEncipherment
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExW
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
RegQueryValueExA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegEnumValueA
GetUserNameA
comctl32
ord17
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
gdi32
SelectObject
DeleteDC
RestoreDC
DeleteObject
GetTextFaceA
GetTextMetricsA
CreateFontA
GetDeviceCaps
SetMapMode
SaveDC
Polyline
CreatePen
ExtTextOutW
GetTextExtentPoint32W
SetTextAlign
SetBkMode
SetTextColor
CreateFontIndirectA
GetObjectA
kernel32
GetStartupInfoA
ReleaseMutex
WaitForSingleObject
WaitForMultipleObjects
DeleteFileA
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
ExitProcess
GetModuleHandleA
MapViewOfFile
IsDBCSLeadByte
GetCommandLineA
CloseHandle
CreateThread
Sleep
GetCurrentProcess
TerminateProcess
GetCurrentProcessId
GetLastError
CreateMutexA
LoadLibraryA
SetUnhandledExceptionFilter
MulDiv
FreeLibrary
WideCharToMultiByte
IsBadReadPtr
GetModuleFileNameA
GetSystemDefaultLangID
GetProcAddress
GetUserDefaultLangID
GetACP
GetSystemDefaultLCID
GetVersionExA
InitializeCriticalSection
GetProcessHeap
DeleteCriticalSection
lstrcpyA
GetTempPathA
GetProfileStringA
SetEvent
CreateSemaphoreA
CreateProcessW
HeapAlloc
CreateFileMappingA
GetFileSize
CreateFileA
UnmapViewOfFile
DeleteFileW
GetTickCount
SetEnvironmentVariableA
ReadProcessMemory
VirtualQueryEx
GetSystemInfo
GetFileAttributesA
CreateDirectoryA
WriteFile
SetFilePointer
CreateFileW
LockResource
LoadResource
FindResourceExA
GetSystemDirectoryA
SetEndOfFile
ExpandEnvironmentStringsA
CreateProcessA
OpenProcess
SetLastError
SetThreadPriority
CreateRemoteThread
LoadLibraryExA
CreateEventA
SuspendThread
GetSystemTime
GetComputerNameA
TlsAlloc
TlsFree
TlsSetValue
VirtualFree
TlsGetValue
ExpandEnvironmentStringsW
GetStringTypeA
LCMapStringW
GetStringTypeW
ResumeThread
GetThreadSelectorEntry
GetThreadContext
HeapFree
VirtualAlloc
GetCurrentThreadId
TerminateThread
LCMapStringA
RtlUnwind
GetLocaleInfoA
IsValidCodePage
oleaut32
SysFreeString
VariantTimeToDosDateTime
SystemTimeToVariantTime
SysAllocString
SysStringLen
shell32
ExtractIconExA
ShellExecuteExA
user32
PostMessageA
GetClientRect
SendDlgItemMessageA
GetSysColor
SetWindowLongA
DestroyWindow
MessageBoxA
DrawIconEx
EnableWindow
CheckDlgButton
IsDlgButtonChecked
LoadStringA
LoadIconA
DrawFocusRect
SetWindowTextW
LoadCursorA
DestroyIcon
GetWindowPlacement
IsIconic
wsprintfW
LoadStringW
GetWindowThreadProcessId
EnumWindows
SendMessageTimeoutA
GetParent
UpdateWindow
CharPrevA
CallWindowProcA
CallWindowProcW
IsWindowUnicode
SetCursor
InvalidateRect
GetScrollInfo
GetWindowLongA
wsprintfA
SetTimer
KillTimer
DefWindowProcA
PostQuitMessage
SendMessageA
SetScrollInfo
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
CreateWindowExA
RegisterClassExA
DialogBoxParamA
SetWindowPos
GetWindowRect
SystemParametersInfoA
CreateDialogParamW
SetDlgItemTextA
SetFocus
EndDialog
GetDlgItem
ShowWindow
GetDC
MapWindowPoints
DialogBoxParamW
GetSysColorBrush
CreateDialogParamA
SetWindowTextA
GetSystemMetrics
ReleaseDC
FillRect
SetForegroundWindow
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
wininet
InternetWriteFile
InternetCloseHandle
HttpQueryInfoA
InternetQueryOptionA
InternetSetOptionA
InternetReadFileExA
HttpEndRequestA
HttpSendRequestExA
InternetConnectA
InternetOpenA
InternetSetStatusCallback
InternetAutodial
InternetGetConnectedState
HttpOpenRequestA
InternetCanonicalizeUrlA
Sections
.text Size: 144KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE