Static task
static1
Behavioral task
behavioral1
Sample
NEAS.5e6da94efcdb063b4763bab3bf55d9b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.5e6da94efcdb063b4763bab3bf55d9b0.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.5e6da94efcdb063b4763bab3bf55d9b0.exe
-
Size
1.6MB
-
MD5
5e6da94efcdb063b4763bab3bf55d9b0
-
SHA1
ec4abb6ae07477d15172802035dd09b7e6076b3f
-
SHA256
ad98329aea3cd137da296adbffe8faa20465b4e65cc6cc1a6a387a29de0f1f00
-
SHA512
39a821e3fbb0d6d312ea6eba88207f1771b6e46eeaecc0e6ca005534fcaea1bd01e8bc06d50c89fc782a8b221ae3d8e9ba678d7e7972aab939546fa430c717f9
-
SSDEEP
24576:33FPaicz+o1F8BRaSzEASIxA0H3qUVSeJEFq32OXcffpwpgOVDaovUAn2CWV:H9czdKBRbzLxAEauSaEsxsf21vUA2CW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.5e6da94efcdb063b4763bab3bf55d9b0.exe
Files
-
NEAS.5e6da94efcdb063b4763bab3bf55d9b0.exe.exe windows:4 windows x86
143f0b5004148962d3b3cb54cc1b1c5c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetTempPathA
GetModuleFileNameA
GetDiskFreeSpaceA
lstrlenA
GetDriveTypeA
GetCurrentProcess
WinExec
GlobalUnlock
GlobalFree
GlobalAlloc
GlobalLock
CloseHandle
SetFilePointer
WriteFile
ReadFile
CreateFileA
SetCurrentDirectoryA
MoveFileExA
FormatMessageA
lstrcatA
CopyFileA
SetFileTime
GetShortPathNameA
LoadLibraryA
GetProcAddress
FreeLibrary
WritePrivateProfileStringA
GetPrivateProfileStringA
GetWindowsDirectoryA
GetSystemDirectoryA
GetSystemTime
GetTickCount
GetExitCodeProcess
CreateProcessA
GetFullPathNameA
MultiByteToWideChar
GlobalHandle
FindClose
FindFirstFileA
UnhandledExceptionFilter
GetACP
GetCPInfo
GetOEMCP
LCMapStringA
WideCharToMultiByte
LCMapStringW
HeapReAlloc
VirtualAlloc
IsBadWritePtr
HeapCreate
HeapDestroy
VirtualFree
GetVersion
GetCommandLineA
GetEnvironmentVariableA
GetModuleHandleA
RaiseException
GetStartupInfoA
CreateDirectoryA
SetUnhandledExceptionFilter
RtlUnwind
HeapCompact
MoveFileA
TerminateProcess
ExitProcess
GetLastError
DeleteFileA
SetEnvironmentVariableA
GetFileAttributesA
SetFileAttributesA
HeapAlloc
HeapFree
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
GetCurrentDirectoryA
IsBadReadPtr
IsBadCodePtr
user32
IsDlgButtonChecked
SetTimer
CloseClipboard
GetWindowRect
GetDlgItem
KillTimer
CheckRadioButton
MessageBoxA
CreateDialogIndirectParamA
IsDialogMessageA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
EnableWindow
SetFocus
GetClipboardData
ShowWindow
wsprintfA
OpenClipboard
IsClipboardFormatAvailable
GetDlgItemTextA
SendDlgItemMessageA
SetDlgItemTextA
PeekMessageA
SendMessageA
EndPaint
BeginPaint
GetQueueStatus
CheckDlgButton
SetWindowLongA
GetWindowLongA
RegisterWindowMessageA
SetWindowTextA
GetParent
GetDC
ReleaseDC
DrawTextA
FillRect
GetWindow
LoadCursorA
CreateWindowExA
LoadIconA
GetLastActivePopup
RegisterClassA
FindWindowA
AdjustWindowRectEx
BringWindowToTop
GetSystemMetrics
ExitWindowsEx
UpdateWindow
DialogBoxIndirectParamA
IsIconic
DefWindowProcA
PostQuitMessage
EndDialog
RedrawWindow
PostMessageA
ScreenToClient
GetClientRect
SetWindowPos
GetSysColor
OemToCharA
gdi32
GetStockObject
DeleteObject
CreateFontIndirectA
GetObjectA
ExtTextOutA
SetBkColor
CreatePalette
GetSystemPaletteEntries
GetDeviceCaps
StretchDIBits
RealizePalette
SelectPalette
IntersectClipRect
CreateDIBPatternBrush
SetTextColor
SetBkMode
SelectObject
DeleteDC
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
AddFontResourceA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
advapi32
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueA
shell32
SHGetPathFromIDListA
DragQueryFileA
SHGetSpecialFolderLocation
ShellExecuteA
DragFinish
DragAcceptFiles
ole32
CoCreateInstance
OleInitialize
OleUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ