Static task
static1
Behavioral task
behavioral1
Sample
NEAS.b2ae95a8c6f06d100dd52437d3b00200.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.b2ae95a8c6f06d100dd52437d3b00200.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.b2ae95a8c6f06d100dd52437d3b00200.exe
-
Size
319KB
-
MD5
b2ae95a8c6f06d100dd52437d3b00200
-
SHA1
30c0b7bce8542dfb4070813dfe299112e591bb25
-
SHA256
f1457ad940e36e78916a411d438ba7254321536d44b0003950a9f410c89c6dc8
-
SHA512
241adac60d57e77cc68823319f27160ca429bc959a3cf39fb95ae2bc8b7ca6ead556791a4a0aacc5dcad2b7ad18635bc9ce83491936110a4211466d76171b4f5
-
SSDEEP
6144:Q72BlDtOGka2OXvhD6dZkixqim9S8O79AsoVE43rD6Tzn9Rx1agOO1:K2Blp2evFcBZruEKr2lwe1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.b2ae95a8c6f06d100dd52437d3b00200.exe
Files
-
NEAS.b2ae95a8c6f06d100dd52437d3b00200.exe.exe windows:5 windows x86
576aaf61949692919199cdfbdfa6c9d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr100
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_acmdln
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_invoke_watson
_controlfp_s
_ismbblead
_mbscmp
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
?terminate@@YAXXZ
_vsnprintf_s
_ftime64_s
strftime
_localtime64
fprintf_s
_dupenv_s
_wstat64i32
strcat_s
memcpy_s
_splitpath_s
strcpy_s
??_V@YAXPAX@Z
fgets
atoi
fseek
sprintf_s
_vsnprintf
_mbsnbicmp
_mbstok_s
_mbsrchr
_access
_ismbcspace
memcpy
__argc
__argv
sscanf
__CxxFrameHandler3
exit
_putenv
sprintf
memmove
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
??2@YAPAXI@Z
realloc
_snprintf
_stat64i32
vfprintf
fflush
fclose
getenv
free
_time64
malloc
_snprintf_s
fopen_s
??3@YAXPAX@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
_mbslen
_mbsstr
_mbsnbcpy_s
_mbschr
strrchr
memset
calloc
_strdup
_mbsnbcmp
_mbsicmp
_crt_debugger_hook
user32
GetShellWindow
wsprintfA
OpenInputDesktop
CloseDesktop
GetWindowThreadProcessId
ole32
StringFromCLSID
CoTaskMemFree
oleaut32
VariantClear
SysAllocStringByteLen
SysStringLen
SysAllocString
SysFreeString
kernel32
RaiseException
GetCurrentThreadId
OutputDebugStringA
GetLocalTime
GetTempPathA
InterlockedDecrement
WTSGetActiveConsoleSessionId
FormatMessageA
CreateProcessA
CreateFileA
GlobalAlloc
GlobalFree
GetNativeSystemInfo
VerSetConditionMask
VerifyVersionInfoA
GlobalMemoryStatusEx
InterlockedIncrement
GetModuleHandleA
lstrlenA
WideCharToMultiByte
GetCurrentProcess
LocalAlloc
Process32First
Process32Next
CreateEventA
SetEvent
GetShortPathNameA
OpenProcess
CreateToolhelp32Snapshot
Sleep
Module32First
GetLongPathNameA
GetSystemDirectoryA
LocalFree
GetVersionExA
GetProcAddress
LoadLibraryA
FreeLibrary
lstrcpyA
GetWindowsDirectoryA
FindFirstFileA
GetModuleFileNameA
FindClose
GetEnvironmentVariableA
GetLastError
SetEnvironmentVariableA
WaitForSingleObject
CloseHandle
GetCurrentProcessId
GetSystemWindowsDirectoryA
GetModuleHandleExA
GetExitCodeProcess
InterlockedExchange
InterlockedCompareExchange
HeapSetInformation
GetStartupInfoW
EncodePointer
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
MultiByteToWideChar
GetFileAttributesA
Sections
.text Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 240KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ