Static task
static1
Behavioral task
behavioral1
Sample
NEAS.87f6ac0426c08587c22626a0176b5620.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.87f6ac0426c08587c22626a0176b5620.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.87f6ac0426c08587c22626a0176b5620.exe
-
Size
10KB
-
MD5
87f6ac0426c08587c22626a0176b5620
-
SHA1
3075451e21f2492b50b40dc6acfb7dbdb6b1f1cc
-
SHA256
2bae020f45c4867a118027d628974f9f96b5189c9e3c3d33d97fb85675655f01
-
SHA512
e5733c1463ea7366a6f7d2490edb808576ba42277422021ce39ba6a118080a3dc024c01fdb698ef66d7f0ebcc77f068db3f19345dd4b88ca1bb6893945bacb1c
-
SSDEEP
192:KvDayCtKu4cdD3Mn/2KetAj0EHuMkMn/ZW6W4WLL5+x3:SDq5x382ZtAnm8ZW6W4WLLs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.87f6ac0426c08587c22626a0176b5620.exe
Files
-
NEAS.87f6ac0426c08587c22626a0176b5620.exe.exe windows:5 windows x86
73ae09d13347c879c4f100af670695d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadStringW
ntdll
RtlOemStringToUnicodeString
wcschr
RtlInitUnicodeString
RtlUnicodeStringToOemString
RtlInitString
msvcrt
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_initterm
_except_handler3
_controlfp
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
__set_app_type
kernel32
WriteFile
GetModuleHandleA
GetFileAttributesW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetEnvironmentVariableW
SearchPathW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetStdHandle
ExitProcess
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ