Static task
static1
Behavioral task
behavioral1
Sample
NEAS.447f19859068d02e16db3ab70a670240.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.447f19859068d02e16db3ab70a670240.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.447f19859068d02e16db3ab70a670240.exe
-
Size
300KB
-
MD5
447f19859068d02e16db3ab70a670240
-
SHA1
62a08c4950fb35d7bec6f2917dec6bdfd8744f7c
-
SHA256
370748c5b19c637d870b0a23ca10b64d77af0be59cb29c636f3221d7f80e9cc8
-
SHA512
d2d0e25547972c2569b2b9860f41e238635f0f1d933db7f7ac3128f510938f6f8c4566617f199fd16dab4fd76835eae7a2e63eb3740c5108f92a3e77bbec1f80
-
SSDEEP
3072:cRdAqIRYbmORfmrKX6EZDlvbOx8/Imm3o0VsJkbF9s333899999cV/rLS15rGZ:cbAlRqHRfmrUxbHEs+9h5r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.447f19859068d02e16db3ab70a670240.exe
Files
-
NEAS.447f19859068d02e16db3ab70a670240.exe.exe windows:4 windows x86
e301df5d9b60254020cdbacb80482b27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
lstrcatA
GetModuleHandleA
GetSystemDirectoryA
CreateDirectoryA
GetFileAttributesA
DeleteFileA
FindFirstFileA
FindNextFileA
TerminateProcess
ResumeThread
WaitForSingleObject
CloseHandle
CreateProcessA
GetLastError
RemoveDirectoryA
WritePrivateProfileStringA
HeapSize
SetEndOfFile
FindClose
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
LoadLibraryA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
SetStdHandle
IsBadWritePtr
HeapReAlloc
InterlockedExchange
InitializeCriticalSection
CreateFileA
GetOEMCP
GetACP
GetVersion
SetCurrentDirectoryA
GetPrivateProfileIntA
GetModuleFileNameA
lstrlenA
lstrcpyA
GetSystemTimeAsFileTime
lstrcmpA
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersionExA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
HeapFree
ReadFile
WriteFile
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
HeapAlloc
ExitProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
GetLocaleInfoA
GetCPInfo
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStringTypeA
GetStringTypeW
user32
MessageBoxA
GetMessageA
LoadIconA
UpdateWindow
CreateDialogParamA
ShowWindow
SendMessageA
LoadCursorA
GetWindowLongA
ChildWindowFromPointEx
ScreenToClient
GetCursorPos
TranslateMessage
SetCursor
GetWindowRect
GetDlgItemTextA
EndDialog
SetWindowPos
PostQuitMessage
EnableWindow
SendDlgItemMessageA
SetDlgItemTextA
GetDlgItem
PostMessageA
DispatchMessageA
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
shell32
ShellExecuteA
forcedll
ForceDLL
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 88B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 208KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ