Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4713a0549f00d3d33e755c912acc9760.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4713a0549f00d3d33e755c912acc9760.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4713a0549f00d3d33e755c912acc9760.exe
-
Size
364KB
-
MD5
4713a0549f00d3d33e755c912acc9760
-
SHA1
866cd2016fa5afb9c174789d82cba1a1bbb120f2
-
SHA256
67403f927fb7c07f880cdfd97369e03a2e6846245f733f48fb5407f69b95c2c8
-
SHA512
7e00663420a343902797f8a7673c6c15a68852a4fd01e9de7fedc0eedcbd9f4585098755bc54dec6be82f192d9ba5063014239c16ed1016b94d17a987b826f98
-
SSDEEP
6144:6fiQweN71HiLMqZyqIcbuf+oqXogv70HWWWCWWW+/85/8OBe0Wh:TeXHiLM8ypcQJ/85/8OJg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.4713a0549f00d3d33e755c912acc9760.exe
Files
-
NEAS.4713a0549f00d3d33e755c912acc9760.exe.exe windows:4 windows x86
c57a8fd87cb13ac3f01cf28afbc6be87
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
mfc42
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord800
ord641
ord860
ord540
ord324
ord825
ord2370
ord4234
ord6334
ord2818
ord823
ord4710
ord4673
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord4424
ord3738
ord815
ord561
ord1105
ord2086
ord2621
ord1134
ord4160
ord3663
ord1146
ord1168
ord2379
ord755
ord470
ord5440
ord6383
ord5450
ord6394
ord1948
ord5303
ord2982
ord5715
ord565
ord817
ord6215
ord2726
ord4226
ord1106
ord2393
ord1271
ord1842
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord975
ord5472
ord3403
ord2879
ord2878
ord1576
ord6055
ord4077
ord1776
ord5237
ord5282
ord2649
ord1665
ord4436
ord796
ord674
ord355
ord529
ord366
ord4242
ord1233
ord5252
ord4427
ord2863
ord6067
ord6000
ord2117
ord4457
ord5981
ord4413
ord3021
ord6069
ord665
ord1979
ord3175
ord5186
ord3499
ord354
ord353
ord537
ord6130
ord6128
ord6378
ord6197
ord6380
ord5290
ord3742
ord567
ord818
ord4275
ord3754
ord5768
ord6129
ord3752
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord3798
ord5280
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1775
ord4078
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord4699
ord4151
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__CxxFrameHandler
strncpy
strstr
sprintf
_ftol
_mbsicmp
malloc
free
__dllonexit
_onexit
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_setmbcp
_acmdln
__getmainargs
_initterm
kernel32
GetStartupInfoA
GetModuleHandleA
GetVersionExA
SetEvent
Sleep
WaitForSingleObject
ResumeThread
GetModuleFileNameA
CloseHandle
GetLastError
CreateEventA
CreateMutexA
user32
SetWindowTextA
LoadCursorA
GetWindowRect
AdjustWindowRect
GetDC
InvalidateRect
GetMenu
CheckMenuRadioItem
IsWindow
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
EnableWindow
SetRect
gdi32
BitBlt
DeleteDC
CreateCompatibleDC
DeleteObject
SelectObject
CreateDIBitmap
GetObjectType
advapi32
OpenServiceA
RegSetValueExA
OpenSCManagerA
QueryServiceStatus
ControlService
StartServiceA
CloseServiceHandle
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 680B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�54�C Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE