Static task
static1
Behavioral task
behavioral1
Sample
NEAS.694d48c8ec6676168f2f07c3a0be86b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.694d48c8ec6676168f2f07c3a0be86b0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.694d48c8ec6676168f2f07c3a0be86b0.exe
-
Size
381KB
-
MD5
694d48c8ec6676168f2f07c3a0be86b0
-
SHA1
27eff78831ad7e0f861efed9ba3e84f24b627ef7
-
SHA256
5df77bfb80290db489ff760de50dd9953f5ed05476419bfb63a466b8514858d7
-
SHA512
6d90e43a930507f7d1869951522217fa70a9287dbc728180e98da3f728a7d832ef53b92cd957e215b10b7397d087d86011cf1cdf665b58107f66c5def47e4e44
-
SSDEEP
6144:NSOzCwwwwwwwwwwwwwwwwwwww8wwwwewwwwwwwwwwwwwwwwwwwwww5wwwwwwwww5:NSBwwwwwwwwwwwwwwwwwwww8wwwweww8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.694d48c8ec6676168f2f07c3a0be86b0.exe
Files
-
NEAS.694d48c8ec6676168f2f07c3a0be86b0.exe.exe windows:5 windows x86
a1a1899656a739dea3ba006b09bbe1fe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
OpenFile
GetModuleFileNameA
HeapFree
lstrlenA
lstrcatA
lstrcpyA
lstrcmpW
SizeofResource
LockResource
LoadResource
FindResourceA
GetModuleHandleW
ExitProcess
CreateMutexW
VirtualQuery
GetModuleFileNameW
GetProcessHeap
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
LoadLibraryA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
DebugBreak
RaiseException
IsDebuggerPresent
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
HeapAlloc
ReadFile
OpenProcess
CloseHandle
SuspendThread
GetSystemInfo
VirtualQueryEx
ReadProcessMemory
lstrlenW
lstrcpyW
ResumeThread
GetCurrentProcess
GetLastError
GetSystemTimeAsFileTime
FreeLibrary
user32
CreateWindowExA
SetTimer
UpdateWindow
SetForegroundWindow
ShowWindow
SetWindowTextW
SendMessageW
MoveWindow
RegisterClassW
LoadIconW
LoadCursorW
DispatchMessageW
TranslateMessage
GetMessageW
SetWindowRgn
GetWindowTextA
DefWindowProcA
ReleaseDC
CreateWindowExW
SetWindowLongW
SendMessageA
CallWindowProcW
GetDC
GetForegroundWindow
GetClassNameW
FindWindowExW
GetWindowThreadProcessId
gdi32
DeleteDC
CreateFontIndirectW
BitBlt
CreateRoundRectRgn
GetDeviceCaps
SelectObject
CreateCompatibleDC
CreateDIBitmap
GetObjectW
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
ws2_32
sendto
htons
inet_addr
WSACleanup
socket
WSAStartup
closesocket
msvcr90d
_invoke_watson
_controlfp_s
?terminate@@YAXXZ
_except_handler4_common
_crt_debugger_hook
_initterm_e
_initterm
_CrtDbgReportW
_CrtSetCheckCount
_acmdln
_ismbblead
exit
_cexit
memcmp
memset
memcpy
??2@YAPAXI@Z
_CRT_RTC_INITW
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_amsg_exit
__getmainargs
_exit
_XcptFilter
Sections
.textbss Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 326KB - Virtual size: 325KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ