Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4f5ed1c464f26b02a6344a3fbb5c8930.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4f5ed1c464f26b02a6344a3fbb5c8930.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4f5ed1c464f26b02a6344a3fbb5c8930.exe
-
Size
691KB
-
MD5
4f5ed1c464f26b02a6344a3fbb5c8930
-
SHA1
12e8fa21cc871c9b0d3e7f66265c3f8b1a9b1bd5
-
SHA256
981f4728d4eeedde1d77cdac4ff8fd7aee1d663bd3a6a460f55f5ff1516160c9
-
SHA512
6bb6a6763a425e48c56cad754636fe5cc322c6aa514c382b3b65d9e3dd93ad5f7953558cadeffa15d68d929d3dbc5afb45cd6a92c1d83636f8f82239b86bc9d7
-
SSDEEP
6144:Uyhup86VLO5chFuJNcvV1yUhJ0NkCJkHmCvyMvbc3FfsQksOEN:Uyhup6JNEhCNkCJkTyucVDN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.4f5ed1c464f26b02a6344a3fbb5c8930.exe
Files
-
NEAS.4f5ed1c464f26b02a6344a3fbb5c8930.exe.exe windows:5 windows x86
746d16eec231f24fe830c4e19aed9746
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCloseHandle
InternetConnectA
InternetOpenA
HttpSendRequestA
InternetReadFile
HttpOpenRequestA
kernel32
GetCPInfo
GetOEMCP
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
GetFileSizeEx
GetFileTime
GetSystemTimeAsFileTime
RtlUnwind
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
ExitProcess
HeapReAlloc
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CompareStringW
SetEnvironmentVariableA
FileTimeToSystemTime
GetFullPathNameA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalFlags
WritePrivateProfileStringA
InterlockedIncrement
GetModuleHandleW
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
FreeResource
GetCurrentProcessId
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
InterlockedDecrement
GetModuleFileNameW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
MulDiv
SetLastError
MultiByteToWideChar
lstrcpynA
ExpandEnvironmentStringsA
GetSystemTime
GetModuleFileNameA
GetTickCount
WideCharToMultiByte
Sleep
GetSystemDirectoryA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
OpenFile
lstrcatA
GetLastError
OutputDebugStringA
lstrcmpiA
GetCurrentProcess
GetVersion
GetModuleHandleA
LocalAlloc
lstrcmpA
lstrlenA
LocalFree
LoadLibraryA
GetProcAddress
FreeLibrary
CreateFileA
CloseHandle
GetWindowsDirectoryA
lstrcpyA
GetVolumeInformationA
FindResourceA
LoadResource
LockResource
SizeofResource
IsDebuggerPresent
user32
RegisterClipboardFormatA
PostThreadMessageA
CharNextA
CharUpperA
ReleaseCapture
SetCapture
UnregisterClassA
GetSysColorBrush
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
EqualRect
DefWindowProcA
CallWindowProcA
GetMenu
IntersectRect
SystemParametersInfoA
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SendDlgItemMessageA
GetWindowTextLengthA
GetWindowTextA
SetFocus
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
PeekMessageA
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
GetFocus
GetParent
ModifyMenuA
EnableMenuItem
CheckMenuItem
PostMessageA
PostQuitMessage
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DestroyMenu
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
SetRect
IsRectEmpty
PtInRect
CopyAcceleratorTableA
LoadCursorA
SetTimer
UpdateWindow
LoadBitmapA
CopyRect
OffsetRect
GetSystemMetrics
LoadIconA
GetDesktopWindow
GetClientRect
GetWindowRect
IsIconic
SendMessageA
DrawIcon
EnableWindow
GetKeyState
LoadStringA
MessageBoxA
wsprintfA
GetWindowPlacement
gdi32
ExtSelectClipRgn
DeleteDC
RectVisible
GetStockObject
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
GetMapMode
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
CreateBitmap
GetDeviceCaps
BitBlt
CreateCompatibleDC
GetObjectA
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
TextOutA
comdlg32
GetFileTitleA
winspool.drv
EnumPrintersA
SetPrinterDataA
OpenPrinterA
DeleteMonitorA
EnumMonitorsA
DeletePrinter
AddPrinterDriverA
AddPrinterA
GetPrinterDriverDirectoryA
DeletePrinterDriverA
GetPrinterDriverA
AddMonitorA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegDeleteValueA
RegSetKeySecurity
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
MakeSelfRelativeSD
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteA
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
oledlg
ord8
ole32
CoTaskMemAlloc
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoTaskMemFree
CLSIDFromString
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
oleaut32
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysAllocStringByteLen
SysFreeString
OleCreateFontIndirect
SysAllocString
Sections
.text Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 378KB - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ