Static task
static1
Behavioral task
behavioral1
Sample
NEAS.c5a284a16214412b19b2c543bae39850.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.c5a284a16214412b19b2c543bae39850.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.c5a284a16214412b19b2c543bae39850.exe
-
Size
981KB
-
MD5
c5a284a16214412b19b2c543bae39850
-
SHA1
be3569dfd8b51a6a313c561f9c89d0c55c0647bf
-
SHA256
83aded78fd711b7d6305ba91a832562a271206b48f05d0185d718b04b7b31db6
-
SHA512
26e67b6f7d67bdb67a13edfd9c417ad15161b835ac8e47b263e42fa9c7761e829db15a6561922b16df2432644a1b82c91031c227d1e07e91e98f722dbfe84741
-
SSDEEP
24576:U3nmLCzvpI6QhAM7LtUrJan8KnseJSG3krYVosgR5RyUsSD8gv:0m0I6QGM7RZlnse9q3vyUs8L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.c5a284a16214412b19b2c543bae39850.exe
Files
-
NEAS.c5a284a16214412b19b2c543bae39850.exe.exe windows:5 windows x86
b133aa41fedc27d102952e923bb9a7b1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetQueryDataAvailable
InternetGetLastResponseInfoW
InternetSetStatusCallbackW
InternetSetFilePointer
InternetWriteFile
InternetOpenUrlW
DeleteUrlCacheEntryW
InternetCanonicalizeUrlW
InternetCloseHandle
HttpOpenRequestW
HttpQueryInfoW
HttpAddRequestHeadersW
HttpSendRequestW
InternetConnectW
InternetReadFile
InternetCrackUrlW
InternetOpenW
GetUrlCacheEntryInfoW
InternetQueryOptionW
InternetSetOptionExW
InternetCheckConnectionW
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
kernel32
UnlockFile
SetEndOfFile
DuplicateHandle
GetCurrentProcess
GetVolumeInformationW
GetFullPathNameW
FindNextFileW
GetModuleHandleA
GetVersionExA
LoadLibraryA
CompareStringW
GlobalFindAtomW
lstrlenA
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetFileSizeEx
GetFileTime
GlobalFlags
SetErrorMode
GetStartupInfoW
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
LockFile
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
RtlUnwind
SetStdHandle
GetFileType
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
GetCurrentDirectoryA
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
SetEnvironmentVariableA
FlushFileBuffers
GetThreadLocale
GlobalAddAtomW
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
lstrcmpW
MulDiv
FormatMessageW
LocalFree
LoadLibraryW
FileTimeToLocalFileTime
GetCurrentProcessId
SetLastError
GetCurrentThreadId
CreateEventW
FileTimeToSystemTime
GetTickCount
UnmapViewOfFile
GetFileSize
LocalFileTimeToFileTime
GetCurrentDirectoryW
ReadFile
SetFileTime
SystemTimeToFileTime
SetFilePointer
FindClose
FindFirstFileW
FreeResource
GlobalUnlock
GetFileAttributesW
GlobalLock
DeleteCriticalSection
lstrcmpiW
EnterCriticalSection
GetProcAddress
GetLastError
RaiseException
LeaveCriticalSection
GetModuleHandleW
LoadLibraryExW
FreeLibrary
WideCharToMultiByte
CreateThread
GetPrivateProfileIntW
WritePrivateProfileStringW
lstrlenW
GetModuleFileNameW
GetVersionExW
Sleep
InitializeCriticalSection
WaitForSingleObject
CreateDirectoryW
InterlockedDecrement
InterlockedIncrement
lstrcatW
GetTempPathW
GetCommandLineW
DeleteFileW
CloseHandle
LockResource
LocalAlloc
GlobalFree
MultiByteToWideChar
CreateFileW
SizeofResource
GlobalAlloc
WriteFile
GetPrivateProfileStringW
LoadResource
FindResourceW
UnhandledExceptionFilter
user32
PostThreadMessageW
DestroyMenu
RegisterWindowMessageW
LoadIconW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextW
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
UpdateWindow
GetClientRect
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
UnregisterClassW
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
RegisterClipboardFormatW
UnhookWindowsHookEx
SetActiveWindow
CreateDialogIndirectParamW
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
CharUpperW
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
PostMessageW
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetWindowThreadProcessId
GetParent
GetLastActivePopup
MessageBeep
GetNextDlgGroupItem
ReleaseCapture
SetCapture
InvalidateRgn
CopyAcceleratorTableW
SetRect
IsRectEmpty
GetSysColorBrush
MoveWindow
SetWindowTextW
IsDialogMessageW
EqualRect
IsWindowEnabled
MessageBoxW
GetDesktopWindow
CharNextW
UpdateLayeredWindow
GetDC
GetWindowLongW
ReleaseDC
SetWindowLongW
GetSystemMetrics
SetCursor
SetWindowRgn
GetWindowRect
LoadCursorW
PtInRect
wsprintfW
InvalidateRect
ShowWindow
CloseWindow
SendMessageW
EnableWindow
TabbedTextOutW
SendDlgItemMessageW
gdi32
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetStockObject
GetViewportExtEx
SetBkColor
SaveDC
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
RestoreDC
CreateBitmap
GetDeviceCaps
DeleteDC
CreateDIBSection
CreatePolygonRgn
BitBlt
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetObjectW
GetClipBox
SetMapMode
SetTextColor
GetWindowExtEx
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegQueryValueExW
RegSetValueExW
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
shell32
CommandLineToArgvW
ShellExecuteExW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
ShellExecuteW
shlwapi
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathIsUNCW
UrlUnescapeW
oledlg
OleUIBusyW
ole32
CoInitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CreateStreamOnHGlobal
CLSIDFromProgID
CLSIDFromString
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoUninitialize
oleaut32
OleCreateFontIndirect
SysAllocStringLen
SysStringLen
VarUI4FromStr
SysFreeString
VariantChangeType
VariantInit
VariantClear
SysAllocString
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantCopy
SafeArrayDestroy
gdiplus
GdipCreateFromHDC
GdipCreateFontFamilyFromName
GdipDrawString
GdipCreateFont
GdipCreateSolidFill
GdipDeleteFontFamily
GdipSetSmoothingMode
GdipDeleteGraphics
GdipDeleteFont
GdipMeasureString
GdipGetImageHeight
GdipCreateStringFormat
GdipDeleteBrush
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipAlloc
GdipFree
GdipGetImageWidth
GdipDeleteStringFormat
GdipDrawImageRectRectI
GdipLoadImageFromStream
Sections
.text Size: 325KB - Virtual size: 325KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 521KB - Virtual size: 520KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ