Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe
-
Size
29KB
-
MD5
f49f6bd73b2ca454f8801a822d7903b0
-
SHA1
09d13862e1e74e9d68bcb2cb1add3fc44e6092fb
-
SHA256
e224b969ed43bd211f56052f3ab1e73bd1dcb403b60f45ba7cee5a208e6ceaa4
-
SHA512
9ff641724ed6402ba86fa23a7f8f9f1ca2ced9a37c913407f1b4604b2433d57708183779e6f016d24affcad8988bd11ecd2d70712cd66d421c94ab4a4d026fa8
-
SSDEEP
384:qfRJYAySsaRbAEJb/0rZRwZBgs3CVyu850fEvkjzJYFedvKUm4U2JgEVSZTS0p9K:qfRygBbJj0dRwzgvysfjEe4VmGTNpk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe
Files
-
NEAS.f49f6bd73b2ca454f8801a822d7903b0.exe.exe windows:5 windows x86
0c04f28339acdd43cd6fb9855519e957
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetBkMode
SetBrushOrgEx
SetMapMode
SetMetaFileBitsEx
SetPixel
SetPolyFillMode
SetROP2
SetStretchBltMode
SetTextAlign
SetTextColor
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
SetWinMetaFileBits
StartDocW
StartPage
StretchBlt
StretchDIBits
kernel32
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenEventA
OpenFileMappingA
OutputDebugStringA
OutputDebugStringW
PeekNamedPipe
PostQueuedCompletionStatus
PulseEvent
QueryPerformanceCounter
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
ExitProcess
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceW
FlushFileBuffers
FormatMessageA
FormatMessageW
FreeConsole
GetACP
GetDiskFreeSpaceA
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetExitCodeProcess
GetExitCodeThread
GetFullPathNameW
GetLocaleInfoW
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcessHeap
GetProfileStringW
GetQueuedCompletionStatus
GetShortPathNameW
GetStartupInfoA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathA
GetTempPathW
GetUserDefaultLCID
GetVersion
GetVersionExA
GetVersionExW
GetVersionExW
HeapAlloc
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
IsDBCSLeadByteEx
IsValidCodePage
IsValidLocale
pdh
PdhValidatePathA
user32
CreateAcceleratorTableW
CreateIconIndirect
CreateMenu
CreatePopupMenu
CreateWindowExW
DdeClientTransaction
DdeConnect
DdeCreateDataHandle
DdeCreateStringHandleW
DdeDisconnect
GetMessageA
LoadIconA
RegisterClassA
Sections
.text Size: 512B - Virtual size: 35B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ