Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2bc2fcaa0121830f33bb36a91414a770.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.2bc2fcaa0121830f33bb36a91414a770.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.2bc2fcaa0121830f33bb36a91414a770.exe
-
Size
132KB
-
MD5
2bc2fcaa0121830f33bb36a91414a770
-
SHA1
5da081ae9d6e0810d9790469abfbeb018af3c8e4
-
SHA256
d2689a0ad3c41fd72f58f81130f881d282c6bf0b507913e38d17a4c80dab8a6f
-
SHA512
b48db70448cec5ee6b91dd41edcb45e8efd4d9bbff111a854bfc4c2622570dccbb6438573d7d8a2fb69f1bd045b5690176296545678f81fbcc420136e8818eaa
-
SSDEEP
3072:VC9sota7U5lZYdAYon+ITCTRQd7eUBFPM5LIk3pv2m:EttiIObon+ITvxS5L3pOm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.2bc2fcaa0121830f33bb36a91414a770.exe
Files
-
NEAS.2bc2fcaa0121830f33bb36a91414a770.exe.exe windows:4 windows x86
0d191627bb4a7df1d05e20ce4990e94a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord6048
ord1767
ord5283
ord4829
ord4435
ord2047
ord4419
ord858
ord6481
ord2362
ord4253
ord4704
ord5871
ord3084
ord4472
ord4970
ord6330
ord6868
ord2606
ord922
ord537
ord535
ord2101
ord1172
ord5214
ord3658
ord700
ord617
ord398
ord296
ord4199
ord861
ord913
ord6770
ord4184
ord3434
ord2755
ord926
ord3805
ord6279
ord6921
ord4124
ord4272
ord668
ord3306
ord2773
ord2762
ord356
ord2756
ord6278
ord5568
ord2910
ord665
ord354
ord6654
ord2822
ord2805
ord942
ord798
ord1989
ord2800
ord3313
ord6388
ord5188
ord533
ord4197
ord6381
ord6867
ord654
ord341
ord5854
ord6136
ord6919
ord2371
ord4229
ord4370
ord4847
ord5276
ord3592
ord4215
ord2576
ord3649
ord2836
ord809
ord2099
ord2114
ord5706
ord4155
ord3284
ord4158
ord6617
ord807
ord554
ord556
ord2430
ord1637
ord1143
ord2644
ord641
ord325
ord1662
ord5446
ord5436
ord6379
ord6390
ord6489
ord2506
ord6655
ord2859
ord4078
ord1930
ord859
ord2912
ord964
ord6313
ord4177
ord5444
ord6006
ord5774
ord2598
ord3175
ord3178
ord3171
ord3506
ord3719
ord2914
ord5462
ord5624
ord6238
ord6316
ord2862
ord909
ord1173
ord4180
ord394
ord696
ord3638
ord397
ord699
ord1808
ord4224
ord4992
ord4848
ord4371
ord5261
ord4352
ord4942
ord4736
ord4899
ord5154
ord5156
ord5155
ord6593
ord823
ord2810
ord6139
ord4709
ord5977
ord4294
ord941
ord940
ord6874
ord6211
ord3087
ord2634
ord2638
ord4254
ord768
ord6485
ord541
ord6564
ord1165
ord6525
ord801
ord6740
ord4425
ord4621
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2046
ord2640
ord4433
ord4831
ord3793
ord5284
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1768
ord4073
ord6051
ord2520
ord6584
ord1197
ord538
ord800
ord5208
ord540
ord925
ord815
ord825
ord561
ord3733
ord4418
ord4616
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5710
ord5285
ord5303
ord4692
ord4074
ord2717
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord4273
ord4667
ord1569
msvcrt
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_wcmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_mbschr
fgets
fgetws
_CxxThrowException
isspace
wcsrchr
calloc
fclose
fseek
ftell
fwrite
fread
fopen
malloc
_controlfp
_wtol
wcscmp
__CxxFrameHandler
_purecall
memcmp
_wcsicmp
wcsstr
wcschr
_wsplitpath
_wmakepath
free
wcslen
_wcsdup
iswdigit
qsort
kernel32
SetFileTime
CloseHandle
DeleteFileW
GetLastError
MoveFileExW
MulDiv
lstrcpyW
GetModuleHandleW
GetProcAddress
WideCharToMultiByte
CreateFileW
GetLocaleInfoW
MultiByteToWideChar
LCMapStringW
GetFullPathNameW
WriteFile
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
GetACP
GetUserDefaultLangID
GetStartupInfoW
SetFileAttributesW
FindClose
FindNextFileW
FindFirstFileW
WaitForSingleObject
RemoveDirectoryW
GetFileAttributesW
lstrlenW
GetCurrentDirectoryW
CreateDirectoryW
CopyFileW
GetTempPathW
GetTempFileNameW
CreateProcessW
FindResourceW
GetModuleFileNameW
GetCurrentProcess
LoadLibraryW
GetVersionExW
lstrcmpiW
GetCurrentThreadId
user32
CallWindowProcW
GetWindow
LoadImageW
GetDC
ReleaseDC
DestroyIcon
IsWindow
LoadMenuW
CallNextHookEx
GetClassNameW
GetWindowLongW
SetWindowLongW
SetWindowsHookExW
UnhookWindowsHookEx
RegisterClipboardFormatW
EnableWindow
PeekMessageW
DispatchMessageW
IsDialogMessageW
InvalidateRect
UpdateWindow
GetSystemMetrics
GetWindowRect
TranslateMessage
OffsetRect
PostMessageW
GetSysColorBrush
SendMessageW
gdi32
GetDeviceCaps
CreateFontIndirectW
DeleteObject
GetStockObject
GetObjectW
advapi32
RegCloseKey
GetTokenInformation
RegCreateKeyExW
GetUserNameW
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
shell32
ShellExecuteW
SHGetSpecialFolderPathW
urlmon
URLDownloadToFileW
shlwapi
PathCanonicalizeW
PathIsRelativeW
StrCmpW
wininet
DeleteUrlCacheEntry
InternetQueryOptionW
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ