Static task
static1
Behavioral task
behavioral1
Sample
NEAS.eba7e8d6a71a5d1b65778e85da2f5610.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.eba7e8d6a71a5d1b65778e85da2f5610.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.eba7e8d6a71a5d1b65778e85da2f5610.exe
-
Size
535KB
-
MD5
eba7e8d6a71a5d1b65778e85da2f5610
-
SHA1
ded73ea387076424149143efb1bbf93c27c390b9
-
SHA256
424f1cdd8f7d4e7ef673c66645abcf4c28690287e0b04c5d7a597221e2f9fb1d
-
SHA512
5352d95824f5c6f5fe321fcb6f0abcf629d25ca3e4f783e4f98d91eac3b304bc03be8ae1569fa1df29f1d878f9b7183a7b9781c3a4fedc78ef0dfbe06e0161e2
-
SSDEEP
6144:7L+Ovbcc2edoVcVkAiL9KS04pcO6lKW+QXMq0TrQUPGTBfDxs146eW:7aOvbcc2edooTO6lKW1Mq0I6GT9mdeW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.eba7e8d6a71a5d1b65778e85da2f5610.exe
Files
-
NEAS.eba7e8d6a71a5d1b65778e85da2f5610.exe.exe windows:5 windows x86
8c8c4dac3c603d2d6fa4990afd701084
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
oleaut32
SysFreeString
SysReAllocStringLen
SysAllocStringLen
GetErrorInfo
SysFreeString
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
QueryServiceStatusEx
QueryServiceConfig2W
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
EnumServicesStatusW
CloseServiceHandle
user32
MessageBoxA
CharNextW
LoadStringW
CreateWindowExW
mouse_event
keybd_event
TranslateMessage
TrackPopupMenu
SystemParametersInfoW
ShowWindow
SetThreadDesktop
SetForegroundWindow
SetCursorPos
SendMessageW
ReleaseDC
RegisterClassW
PostQuitMessage
PostMessageW
PeekMessageW
OpenInputDesktop
OpenDesktopW
MsgWaitForMultipleObjects
MessageBoxW
MapVirtualKeyW
LoadStringW
LoadIconW
IsWindowVisible
GetWindowThreadProcessId
GetWindowTextW
GetUserObjectInformationW
GetSystemMetrics
GetMessageW
GetDC
GetCursorPos
GetClassNameW
EnumWindows
DispatchMessageW
DestroyMenu
DefWindowProcW
CreatePopupMenu
CloseDesktop
CharUpperW
AppendMenuW
kernel32
Sleep
VirtualFree
VirtualAlloc
lstrlenW
lstrcpynW
VirtualQuery
GetTickCount
GetSystemInfo
GetVersion
CompareStringW
IsValidLocale
SetThreadLocale
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
WideCharToMultiByte
MultiByteToWideChar
GetACP
LoadLibraryExW
GetStartupInfoW
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetCommandLineW
FreeLibrary
GetLastError
UnhandledExceptionFilter
RtlUnwind
RaiseException
ExitProcess
ExitThread
SwitchToThread
GetCurrentThreadId
CreateThread
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FindFirstFileW
FindClose
SetCurrentDirectoryW
GetCurrentDirectoryW
WriteFile
GetStdHandle
CloseHandle
GetProcAddress
RaiseException
LoadLibraryA
GetLastError
TlsSetValue
TlsGetValue
LocalFree
LocalAlloc
GetModuleHandleW
FreeLibrary
lstrlenW
lstrcpyA
lstrcpyW
lstrcmpW
lstrcatW
WriteFile
WideCharToMultiByte
WaitForSingleObject
VirtualQueryEx
VirtualQuery
VirtualFree
UnmapViewOfFile
TerminateThread
SwitchToThread
SuspendThread
Sleep
SetThreadPriority
SetLastError
SetFilePointer
SetFileAttributesW
SetEvent
SetEndOfFile
ResumeThread
ResetEvent
RemoveDirectoryW
ReadFile
RaiseException
QueryDosDeviceW
IsDebuggerPresent
OpenProcess
MoveFileW
MapViewOfFile
LocalFree
LoadLibraryW
IsValidLocale
GlobalUnlock
GlobalReAlloc
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GetVolumeInformationW
GetVersionExW
GetThreadPriority
GetThreadLocale
GetStdHandle
GetProcessTimes
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLogicalDrives
GetLogicalDriveStringsW
GetLocaleInfoW
GetLocalTime
GetLastError
GetFullPathNameW
GetFileSize
GetFileAttributesW
GetExitCodeThread
GetDriveTypeA
GetDriveTypeW
GetDiskFreeSpaceW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetComputerNameW
GetCPInfoExW
GetCPInfo
GetACP
InterlockedExchangeAdd
InterlockedExchange
InterlockedCompareExchange
FreeLibrary
FormatMessageW
FindNextFileW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
EnumSystemLocalesW
EnumCalendarInfoW
DeleteFileW
CreateThread
CreateFileMappingW
CreateFileW
CreateEventW
CreateDirectoryW
CompareStringW
CloseHandle
Sleep
GetLogicalDriveStringsW
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
gdi32
SelectObject
GetDIBits
DeleteObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
ole32
CoCreateGuid
CoUninitialize
CoInitialize
msvcrt
swprintf
memset
memcpy
free
realloc
malloc
ws2_32
WSAIoctl
WSAGetLastError
WSACleanup
WSAStartup
gethostname
gethostbyname
socket
shutdown
setsockopt
send
select
recv
ntohs
ntohl
inet_ntoa
inet_addr
htons
connect
closesocket
psapi
GetProcessImageFileNameW
shlwapi
PathRemoveFileSpecW
PathIsDirectoryW
StrToIntW
Sections
.text Size: 436KB - Virtual size: 435KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.itext Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 20KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.didata Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 24B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ