Static task
static1
Behavioral task
behavioral1
Sample
NEAS.90b26dc1ae9ea11f5a04e80df55cb270.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.90b26dc1ae9ea11f5a04e80df55cb270.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.90b26dc1ae9ea11f5a04e80df55cb270.exe
-
Size
434KB
-
MD5
90b26dc1ae9ea11f5a04e80df55cb270
-
SHA1
d1b7db93a1fc7f5a19f4851e1d250ea41c773bfb
-
SHA256
11d7569486c06ef81aa855b521c0e8cb77771ac49527d492ed5c247491a2ded4
-
SHA512
8bff62bac5f661e52da8d1a3fd6342c8c343087877857d68a2e658e3e721f8a6c2263f01f18e2e4c0f0b8be1f4945017cf3688bc10de0c1756b953978df9a004
-
SSDEEP
6144:+ypQ07uLbiuGEyzgiDa8q+7sZkolSbpZkhP8KW7kkffsVnG25csow1QUxcsL5RH1:+kQJLbEzlDa88ZjlSbpZk1bkffsP1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.90b26dc1ae9ea11f5a04e80df55cb270.exe
Files
-
NEAS.90b26dc1ae9ea11f5a04e80df55cb270.exe.exe windows:4 windows x86
62f205fe3d5e06c190cbad78ac9b9e4e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pbvm90
ord137
kernel32
GetModuleFileNameA
FreeEnvironmentStringsA
LoadLibraryA
GetProcAddress
GetCommandLineA
GetCPInfo
IsDBCSLeadByte
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
GetACP
GetOEMCP
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
GetStringTypeA
VirtualFree
RtlUnwind
WriteFile
GetStringTypeW
HeapFree
HeapAlloc
VirtualAlloc
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ