Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d776a506ab5cdcc202ddd58951b58090.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.d776a506ab5cdcc202ddd58951b58090.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.d776a506ab5cdcc202ddd58951b58090.exe
-
Size
156KB
-
MD5
d776a506ab5cdcc202ddd58951b58090
-
SHA1
d46b33c4654ab6157d46589692b85913da60f5cb
-
SHA256
f901b8520adec013c87a4c03f796df8c2d5be0fa28047f6c46474a86019b16a2
-
SHA512
c0970675f431eb020688c01ea92ccee61b80ce025259018d4480158e92af6e843fba5df12f824a44a20e5aeef8230d68d7e2fff7587e3b40ad1ee8b21c6ce7e6
-
SSDEEP
3072:Xr40L2tJhftVbjBoQdz5Jja5TfBukTosxavphgYmPCn:Xlw9VnBLnx4NukMYSpVm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.d776a506ab5cdcc202ddd58951b58090.exe
Files
-
NEAS.d776a506ab5cdcc202ddd58951b58090.exe.exe windows:4 windows x86
67137e2d01eb8fe0759294c93b0d8148
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapAlloc
ExitProcess
TerminateProcess
RaiseException
HeapReAlloc
HeapSize
GetCPInfo
GetACP
GetOEMCP
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
RtlUnwind
HeapFree
lstrcpynA
GetFullPathNameA
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalLock
GlobalAlloc
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalGetAtomNameA
GlobalAddAtomA
SetErrorMode
GetFileTime
GetProcessVersion
GetFileSize
GetFileAttributesA
WritePrivateProfileStringA
SetLastError
GetCurrentDirectoryA
GlobalFlags
TlsSetValue
TlsGetValue
LocalReAlloc
LeaveCriticalSection
EnterCriticalSection
GlobalReAlloc
DeleteCriticalSection
GlobalHandle
LocalAlloc
TlsAlloc
InitializeCriticalSection
lstrcatA
MulDiv
GetVersion
GlobalUnlock
GlobalFree
LocalFree
GetModuleFileNameA
GlobalDeleteAtom
GetEnvironmentStringsW
FindFirstFileA
CreateDirectoryA
lstrcmpiA
lstrcmpA
FindClose
lstrcpyA
LoadLibraryA
GetProcAddress
FreeLibrary
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
SetHandleCount
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStrings
GetCurrentThread
GetVolumeInformationA
GetExitCodeProcess
WaitForSingleObject
GetLastError
CreateProcessA
GetCurrentThreadId
GetSystemDirectoryA
GetVersionExA
CloseHandle
DeviceIoControl
CreateFileA
user32
SetWindowTextA
ShowWindow
GetDC
ReleaseDC
BeginPaint
EndPaint
DrawTextA
GrayStringA
LoadCursorA
ReleaseCapture
GetDesktopWindow
WindowFromPoint
ClientToScreen
GetClassNameA
PtInRect
TabbedTextOutA
GetSysColorBrush
DestroyMenu
FindWindowA
InvalidateRect
SetRectEmpty
LoadAcceleratorsA
TranslateAcceleratorA
LoadMenuA
SetMenu
ReuseDDElParam
UnpackDDElParam
BringWindowToTop
SetScrollInfo
ShowScrollBar
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenuItemCount
LoadStringA
GetMenu
UpdateWindow
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessagePos
GetWindow
GetWindowRect
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
EndDialog
SetActiveWindow
IsWindow
DestroyWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
CharUpperA
wsprintfA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetParent
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
MessageBoxA
SetCursor
ShowOwnedPopups
PostQuitMessage
PostMessageA
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
WaitForInputIdle
SystemParametersInfoA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
EqualRect
DeferWindowPos
BeginDeferWindowPos
CopyRect
EndDeferWindowPos
ScreenToClient
GetSubMenu
ScrollWindow
GetMenuItemID
GetForegroundWindow
GetLastActivePopup
GetMessageTime
SetForegroundWindow
UnregisterClassA
gdi32
SetTextColor
GetObjectA
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
PtVisible
TextOutA
ExtTextOutA
RectVisible
Escape
SetBkColor
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
shell32
DragQueryFileA
DragFinish
comctl32
ImageList_Destroy
ord17
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ