Static task
static1
Behavioral task
behavioral1
Sample
NEAS.dd6d85d1858f4ad38391fb54eb322680.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.dd6d85d1858f4ad38391fb54eb322680.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.dd6d85d1858f4ad38391fb54eb322680.exe
-
Size
49KB
-
MD5
dd6d85d1858f4ad38391fb54eb322680
-
SHA1
7771703ac0a0771a63dc04ef1d1dcd41cebe536d
-
SHA256
49fa23d7efa174e23f490157f0f05b21346308c4ae066590afa1744fe8b445f3
-
SHA512
db90e1f0b9f5cecbc107e01df29080c9427af85ef1f041313d99d927dee51a55bcb3f1d82e4e3d5d06bc2c268485656a432227086bef5ce249da82ea9291b0f8
-
SSDEEP
768:OK+gyFMvRckEeX/nWXNgNmVuGSlubJ9Ovsr4u1omwngJuPpnTDlDql:RvRckOXNXwGSobJSsr4u1xufql
Malware Config
Signatures
Files
-
NEAS.dd6d85d1858f4ad38391fb54eb322680.exe.exe windows:4 windows x64
172eb2077f7f1d056adb2c3fc8632e5b
Code Sign
33:00:06:b7:c3:2b:ca:21:12:81:b3:66:04:00:00:00:06:b7:c3Certificate
IssuerCN=Microsoft Azure RSA TLS Issuing CA 07,O=Microsoft Corporation,C=USNot Before20/09/2023, 15:16Not After14/09/2024, 15:16SubjectCN=surface.com,O=Microsoft Corporation,L=Redmond,ST=WA,C=US2f:fc:d9:e3:fb:47:f0:b6:93:be:50:a1:72:ed:9e:a0:5d:52:e7:4a:a9:8b:35:6c:05:4d:86:bd:0c:d2:45:57Signer
Actual PE Digest2f:fc:d9:e3:fb:47:f0:b6:93:be:50:a1:72:ed:9e:a0:5d:52:e7:4a:a9:8b:35:6c:05:4d:86:bd:0c:d2:45:57Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateEventA
CreateFileA
CreateFileMappingA
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentThread
GetLastError
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MapViewOfFile
MultiByteToWideChar
OpenProcess
SetErrorMode
SetUnhandledExceptionFilter
Sleep
SleepEx
TlsGetValue
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
msvcrt
__C_specific_handler
___lc_codepage_func
___mb_cur_max_func
__getmainargs
__initenv
__iob_func
__set_app_type
__setusermatherr
_amsg_exit
_cexit
_commode
_errno
_fmode
_initterm
_lock
_onexit
_unlock
abort
calloc
exit
fprintf
fputc
free
fwrite
localeconv
malloc
memcpy
memset
rand
signal
strcmp
strerror
strlen
strncmp
vfprintf
wcslen
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 224B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 2KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 132B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ