Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9d3f640bd5a58819da2656d960884990.exe
Resource
win7-20231020-en
General
-
Target
NEAS.9d3f640bd5a58819da2656d960884990.exe
-
Size
48KB
-
MD5
9d3f640bd5a58819da2656d960884990
-
SHA1
0366e76e4d366e991d29575e3b047ef4acc506d1
-
SHA256
b1b472e6ee0e2bebc61d782b86d34bd95d94297d03963ed2c45d4150141b1a9a
-
SHA512
c9658a860b160153ac51656f5da76290c93f66f267545eea6b1dba6dcd9857bbbe3eb8279fa861208f215e89c50988ea1ebd5a81a290ca60fec848534bc4f24d
-
SSDEEP
768:8gEPwL5Kng7fkij/PvxjnFZ3wCciB9hO1djSWVwoA:UWv7lc1pS5o
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.9d3f640bd5a58819da2656d960884990.exe
Files
-
NEAS.9d3f640bd5a58819da2656d960884990.exe.exe windows:4 windows x86
44214c1d2172b27b989ba1e28fc67b6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
lstrcatA
GetPrivateProfileStringA
InterlockedDecrement
lstrlenA
LoadLibraryA
IsBadCodePtr
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
HeapFree
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
HeapReAlloc
IsBadWritePtr
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
advapi32
RegCreateKeyExA
RegSetValueExA
RegCloseKey
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE