Static task
static1
Behavioral task
behavioral1
Sample
NEAS.61210db4d83f87ce45415cdc430eedc0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.61210db4d83f87ce45415cdc430eedc0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.61210db4d83f87ce45415cdc430eedc0.exe
-
Size
628KB
-
MD5
61210db4d83f87ce45415cdc430eedc0
-
SHA1
3608b2b5d0ebfd0dad623c8c9ae21d381597a3f7
-
SHA256
ce90bac7c6226b1650f90d760915aaf451017dcb9d021c5bf67ebfe3130402bc
-
SHA512
d5e08e719d6daa19fc5d50698a09fe9ef326ec6b1d2f6661316c5036572cfeb4bc3573566f1aba0e82188ee3912f7fc42cf0921cd50c474728c881cb302c2cc3
-
SSDEEP
1536:l5oDCV4DAXN4xGcukKDm17L2kI7o8WsGqbukc8iFucvll7:pVzNiJK9Q8rNpc8iFucvll7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.61210db4d83f87ce45415cdc430eedc0.exe
Files
-
NEAS.61210db4d83f87ce45415cdc430eedc0.exe.exe windows:4 windows x86
558d35320088e2bc610abc6d66b15f70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
DeleteFileA
SetFileAttributesA
GetFileAttributesA
lstrcmpiA
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
GetVersionExA
GetLocalTime
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetFileTime
GlobalFree
MultiByteToWideChar
CreateThread
GetTickCount
InterlockedExchange
GetACP
GetLocaleInfoA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
WideCharToMultiByte
InterlockedDecrement
TerminateThread
ExpandEnvironmentStringsA
GetFileSize
GetLastError
CreateMutexA
HeapCreate
HeapDestroy
HeapReAlloc
ReadFile
WriteFile
CloseHandle
FlushFileBuffers
SetStdHandle
GetProcessHeap
IsBadCodePtr
IsBadReadPtr
GetOEMCP
SetFilePointer
GetStringTypeW
GetStringTypeA
GetSystemInfo
VirtualProtect
GetCPInfo
DebugBreak
SetUnhandledExceptionFilter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
HeapSize
TerminateProcess
GetCommandLineA
VirtualQuery
GlobalAlloc
GlobalLock
GlobalUnlock
Sleep
CreateProcessA
lstrlenA
LoadLibraryA
ReleaseMutex
GetProcAddress
GetSystemTimeAsFileTime
GetCurrentThreadId
QueryPerformanceCounter
LCMapStringW
GetStartupInfoA
RtlUnwind
HeapFree
ExitProcess
HeapAlloc
LCMapStringA
IsBadWritePtr
VirtualAlloc
GetCurrentProcess
FreeLibrary
LoadLibraryExA
LocalFree
VirtualFree
psapi
GetModuleFileNameExA
ws2_32
__WSAFDIsSet
inet_ntoa
user32
ShowWindow
wsprintfA
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterWindowMessageA
SendMessageTimeoutA
EnableWindow
GetWindowThreadProcessId
IsWindowVisible
GetForegroundWindow
GetClassNameA
GetWindowTextA
FindWindowA
BlockInput
FindWindowExA
GetDesktopWindow
SetForegroundWindow
SetFocus
PostMessageA
GetWindowRect
SendMessageA
MoveWindow
keybd_event
VkKeyScanA
OpenClipboard
advapi32
RegSetValueExA
RegCloseKey
OpenSCManagerA
CloseServiceHandle
OpenServiceA
ControlService
ChangeServiceConfigA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyExA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VariantInit
VariantClear
SysFreeString
SysAllocString
ntdll
ZwSystemDebugControl
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 542KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE