Static task
static1
Behavioral task
behavioral1
Sample
NEAS.44790ad534424c3dd164d14cd2c143d0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.44790ad534424c3dd164d14cd2c143d0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.44790ad534424c3dd164d14cd2c143d0.exe
-
Size
165KB
-
MD5
44790ad534424c3dd164d14cd2c143d0
-
SHA1
804943fb8d8b58a9468be9d9cd570968be3bf29c
-
SHA256
4ccb1b4ccef0a63f9314352f1e5c69fea15332953b1f1dbd3d811b00b8596604
-
SHA512
a50b296c61df283aa47eef178708c260398f197efd86e5c2f1ca598472b53e76f2f10d8d94c6927f1835ad9860ad61aefc696221f4c10739c10083acbf8da2d4
-
SSDEEP
3072:ETqdfukefpBRn/OcBP8qimXNTu98k/GbRKfFK59XaDtt6WSSeZmg8XvYj8:ETqne/pGTGqKoGlKN8ZsjSd2gj8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.44790ad534424c3dd164d14cd2c143d0.exe
Files
-
NEAS.44790ad534424c3dd164d14cd2c143d0.exe.exe windows:1 windows x86
febfa014c13c473b7c9c19ff8c3c5220
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringW
kernel32
GetProcAddress
LoadLibraryA
RtlUnwind
VirtualProtect
VerifyVersionInfoW
SetLastError
GetModuleHandleA
GetLastError
GetStdHandle
MultiByteToWideChar
LoadLibraryW
FreeLibrary
LocalFree
LocalAlloc
WriteConsoleW
FormatMessageW
GetModuleHandleW
lstrcpyW
lstrcmpW
lstrcatW
lstrcmpiW
QueryPerformanceCounter
crtdll
__GetMainArgs
exit
raise
signal
user32
LoadStringW
framedyn
??1CHString@@QAE@XZ
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 7KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 144KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 493B - Virtual size: 493B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE