Static task
static1
Behavioral task
behavioral1
Sample
NEAS.e07cb83ef0a310904239f3a1df8a5c50.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.e07cb83ef0a310904239f3a1df8a5c50.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.e07cb83ef0a310904239f3a1df8a5c50.exe
-
Size
699KB
-
MD5
e07cb83ef0a310904239f3a1df8a5c50
-
SHA1
a967acd1ed5ac2494afc79d1012a5d11d8fbe622
-
SHA256
3085a7c8a21dca6824d9ca43530294d5fc155db238dd9d233583d4260bb103fe
-
SHA512
8ca5eaa22497cc77843b93a05b28dbaab0e927fb1a38de6b5aa82fc5745aa7d796eece95c9023da849cf4076ed7b65f97dac1fafceec9cd6a2ff296d85a7aa10
-
SSDEEP
12288:OxhaP9fBFS3TYjE9CqY8xewVHK6RgIZOWzxZqfny+LSe5/9qRA8YAC88iA0QWNtM:OxcB9jv8xNqPIDnITSe5/9jSC8A0LE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.e07cb83ef0a310904239f3a1df8a5c50.exe
Files
-
NEAS.e07cb83ef0a310904239f3a1df8a5c50.exe.exe windows:6 windows x86
36bbf40f5129bcb51a4d411f68ddbfac
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetCurrentProcess
WriteFile
OutputDebugStringA
VirtualAlloc
InitializeProcThreadAttributeList
WaitForSingleObject
ResumeThread
GetModuleHandleA
OpenProcess
GetExitCodeThread
CallNamedPipeA
GetLastError
UpdateProcThreadAttribute
CreateFileA
LoadLibraryA
GetVersionExA
CloseHandle
GetSystemInfo
CreateNamedPipeA
HeapAlloc
QueueUserAPC
VirtualProtectEx
GetThreadContext
GetProcAddress
VirtualAllocEx
GetFileSize
ReadProcessMemory
GetProcessHeap
CreateRemoteThread
CreateProcessA
FormatMessageA
VirtualFreeEx
OpenThread
ConnectNamedPipe
VirtualQueryEx
WriteConsoleW
SetFilePointerEx
ReadConsoleW
SetEndOfFile
WriteProcessMemory
GetFileSizeEx
DeleteProcThreadAttributeList
ReadFile
HeapReAlloc
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
GetCommandLineA
GetCommandLineW
GetStdHandle
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
HeapFree
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
GetStringTypeW
LCMapStringW
CreateFileW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
DecodePointer
user32
GetShellWindow
GetWindowThreadProcessId
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
shlwapi
PathRemoveFileSpecA
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE