Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d31f61543e65e7df82c8b1c5242af900.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.d31f61543e65e7df82c8b1c5242af900.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.d31f61543e65e7df82c8b1c5242af900.exe
-
Size
275KB
-
MD5
d31f61543e65e7df82c8b1c5242af900
-
SHA1
de20a0aed7857eee7a20573f77f737d9bbe784aa
-
SHA256
f12b2a8281e296fb9f91cb13c8d6ba4703f252b26b69063551f8ee48d49dcf57
-
SHA512
c9e4d025fac41d27578d83c9e8fd70f91937eaddc37f3323b3fac3262bbbc2793dedc5c0dbbabeb85a7d13c796d3d2d1a31fa4c2345d931286a5d0ddf2a9d844
-
SSDEEP
1536:OFQGgCohCATtQu8mTbf882pALm7hyXFD+R2txU050kLEpcD1I8G9hmovEDTYKokK:OFQGgiATtQu8x1ry9liALIoj/CTt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.d31f61543e65e7df82c8b1c5242af900.exe
Files
-
NEAS.d31f61543e65e7df82c8b1c5242af900.exe.exe windows:4 windows x86
62f205fe3d5e06c190cbad78ac9b9e4e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pbvm90
ord137
kernel32
GetModuleFileNameA
FreeEnvironmentStringsA
LoadLibraryA
GetProcAddress
GetCommandLineA
GetCPInfo
IsDBCSLeadByte
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
GetACP
GetOEMCP
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapCreate
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
GetStringTypeA
VirtualFree
RtlUnwind
WriteFile
GetStringTypeW
HeapFree
HeapAlloc
VirtualAlloc
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size:
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ