Static task
static1
Behavioral task
behavioral1
Sample
NEAS.083d6780e534a7ffb2f18493fdb7fa50.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.083d6780e534a7ffb2f18493fdb7fa50.dll
Resource
win10v2004-20231020-en
General
-
Target
NEAS.083d6780e534a7ffb2f18493fdb7fa50.exe
-
Size
38KB
-
MD5
083d6780e534a7ffb2f18493fdb7fa50
-
SHA1
347e1a6b6c95742c924f97ce8bbd28b1ba8fee6b
-
SHA256
9c144ac6471435a9814b16da9a6baa87b9a2d784e69819a50bfa4d01deffacce
-
SHA512
2d68fd3b63f36f690f8a61e3375342b8cddabbeb52250f47e2a757f2e9fb6de00a6e3cc1a2bef3538d1a2b5a2ba6328334c63df976cbeaab3543a24d0bd24c3d
-
SSDEEP
768:1lygRzVs/FqnGMTJtrbcN8W2SNgz+pfBi6kLaa4XxIs6K:ugRzVsdkTJ5bU8NX+pfoMhIsn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.083d6780e534a7ffb2f18493fdb7fa50.exe
Files
-
NEAS.083d6780e534a7ffb2f18493fdb7fa50.exe.dll windows:4 windows x86
be97855a8ae95d5147583c56135016e5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
TerminateThread
ExitThread
HeapFree
HeapAlloc
GetProcessHeap
GetVersionExA
GetSystemInfo
GetDiskFreeSpaceExA
GetVolumeInformationA
GetDriveTypeA
GlobalMemoryStatus
GetComputerNameA
MoveFileA
WinExec
FindNextFileA
FindClose
FindFirstFileA
GetLastError
SetCurrentDirectoryA
GetTempFileNameA
GetTempPathA
RemoveDirectoryA
WaitForSingleObject
GetWindowsDirectoryA
CopyFileA
OpenProcess
GetModuleFileNameA
ExitProcess
ResetEvent
CreateEventA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
InterlockedCompareExchange
InterlockedExchange
FreeConsole
AllocConsole
GetStdHandle
SetConsoleScreenBufferSize
CreateProcessA
ReadConsoleOutputA
WriteConsoleInputA
FlushConsoleInputBuffer
GetConsoleScreenBufferInfo
TerminateProcess
CreateThread
Sleep
SetConsoleCtrlHandler
GetLocalTime
SetFilePointer
GetFileSize
DeleteFileA
SetEvent
GetCurrentThreadId
WriteFile
GetSystemDirectoryA
CreateFileA
ReadFile
CloseHandle
GetModuleHandleA
GetProcAddress
GetCurrentDirectoryA
LoadLibraryA
user32
keybd_event
SetCursorPos
mouse_event
SetTimer
GetDC
ReleaseDC
CloseWindowStation
CloseDesktop
SetWindowsHookExA
GetMessageA
TranslateMessage
DispatchMessageA
UnhookWindowsHookEx
CallNextHookEx
GetForegroundWindow
GetWindowTextA
GetKeyNameTextA
PostThreadMessageA
GetKeyState
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
KillTimer
gdi32
DeleteObject
DeleteDC
GetDeviceCaps
CreateDCA
GetDIBits
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
CreatePen
MoveToEx
LineTo
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
QueryServiceConfigA
OpenServiceA
DeleteService
ControlService
StartServiceA
ChangeServiceConfigA
OpenSCManagerA
EnumServicesStatusA
CloseServiceHandle
GetUserNameA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
OpenProcessToken
shell32
ShellExecuteA
msvcr80
_initterm
_initterm_e
_amsg_exit
_adjust_fdiv
__CppXcptFilter
_strupr
_crt_debugger_hook
__clean_type_info_names_internal
_unlock
__dllonexit
_lock
_onexit
_except_handler4_common
_itoa
_wcsupr
_decode_pointer
free
_encoded_null
strstr
??3@YAXPAX@Z
memcpy
memset
??2@YAPAXI@Z
strlen
sprintf
atoi
strcpy
strcat
__CxxFrameHandler3
strcmp
memcmp
wcslen
_encode_pointer
_malloc_crt
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Shared Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ