Static task
static1
Behavioral task
behavioral1
Sample
NEAS.1546009c463c35011e4b305fe9614e80.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.1546009c463c35011e4b305fe9614e80.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.1546009c463c35011e4b305fe9614e80.exe
-
Size
612KB
-
MD5
1546009c463c35011e4b305fe9614e80
-
SHA1
a1e6922fcc17c205ec93326921ef273434f270d8
-
SHA256
9536e054ca7c90f1c3fbdaf24de6d7da57cb68ef7edc90ed3eee366c551def63
-
SHA512
24ce5684951f0589d1043c31644c269ed18696907aedaf4c83cae0ffa2f4ecab20307cabc584e6c95d716ae3657bb10f0e4b3c50fa1bbbfe7e643386ba6b9130
-
SSDEEP
6144:Z7oXMlKP/saw9Wxmf/sCrXKQvreeORShXkOl7hnjwNHh5DSN:kMluNw9HfkCra6WsNlJlN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.1546009c463c35011e4b305fe9614e80.exe
Files
-
NEAS.1546009c463c35011e4b305fe9614e80.exe.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 624B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text1 Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 256KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mackt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE