Static task
static1
Behavioral task
behavioral1
Sample
NEAS.420285f1e72ef2e584860ba63e83ca40.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.420285f1e72ef2e584860ba63e83ca40.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.420285f1e72ef2e584860ba63e83ca40.exe
-
Size
88KB
-
MD5
420285f1e72ef2e584860ba63e83ca40
-
SHA1
6903798a07f83c5b7a18fc87e19ad480518bdcd2
-
SHA256
04d6ee6c531f5f4acf3ed326f775039a23d51689d94243ffb1f462cc156b2340
-
SHA512
db335f05dba356a348fb3d87af3bde499ad7fccd8d053e9d93626927c2d8b9356d7fd6bc230605226974cdf6074ba1a3ecb42e9d2e5e77d9d69153566dc7adc5
-
SSDEEP
1536:AFtkwwOOuTVI8GSVZsz2bUOvZUek/IdvLawwobaeMvF8O7OYy33dzX:ZwhRVI5gu2AOXUIdvLBwAOF8wti3dz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.420285f1e72ef2e584860ba63e83ca40.exe
Files
-
NEAS.420285f1e72ef2e584860ba63e83ca40.exe.exe windows:4 windows x64
b67f1c4ddaf1f296171c9bcae334cd2e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemDirectoryW
GetWindowsDirectoryW
GetSystemDirectoryA
GetLocaleInfoA
GetVersionExA
SetLastError
CopyFileA
SetEndOfFile
LoadLibraryA
SetFilePointer
SetFileAttributesA
DeleteFileA
MoveFileExA
GetWindowsDirectoryA
GetShortPathNameA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetLastError
ReadFile
CreateFileA
CloseHandle
MultiByteToWideChar
WideCharToMultiByte
lstrcpyA
GetLocalTime
RemoveDirectoryA
OutputDebugStringA
InitializeCriticalSection
FlushFileBuffers
SetStdHandle
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
Sleep
GetStringTypeW
GetStringTypeA
HeapCreate
HeapSetInformation
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
GetACP
GetOEMCP
GetCPInfo
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
LCMapStringA
LCMapStringW
RtlUnwindEx
EnterCriticalSection
LeaveCriticalSection
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
user32
wvsprintfA
wsprintfA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
lz32
LZOpenFileA
LZClose
LZCopy
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE