EventLogon
EventStartup
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6f719b6dcf3783816e398b8e395d96a0.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.6f719b6dcf3783816e398b8e395d96a0.dll
Resource
win10v2004-20231020-en
Target
NEAS.6f719b6dcf3783816e398b8e395d96a0.exe
Size
52KB
MD5
6f719b6dcf3783816e398b8e395d96a0
SHA1
f07de1db6f0c269245d7d008e5a4a1a8fc5578c9
SHA256
881effb70ca788a1a27eb4bcd560963e904a910f14a9762c844a59768841b90a
SHA512
14f9591a42015c8e2cfc0653bc59d53e1565a59b28136a3ab1766f8129632a4492268b89f6c8099155246243991eda5802449a6cc8b2cfdc1d5cfc30a9d907ac
SSDEEP
768:f8feHTTKolQpHBu8KFXA2nO+q7qWcEzlLindh:JTTKIGEtNnOj+6lLindh
Checks for missing Authenticode signature.
resource |
---|
NEAS.6f719b6dcf3783816e398b8e395d96a0.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetEnvironmentVariableA
Sleep
WinExec
FindClose
FindFirstFileA
ReadFile
VirtualAlloc
WaitForSingleObject
GetModuleFileNameA
HeapAlloc
LoadLibraryA
WideCharToMultiByte
GetLocalTime
lstrlenW
GlobalAlloc
GetSystemDirectoryA
lstrcatA
CreateFileA
SetFilePointer
lstrlenA
WriteFile
GetLastError
GlobalFree
VirtualProtect
GetModuleHandleA
GetProcAddress
CreateThread
GetFileSize
CloseHandle
InterlockedIncrement
InterlockedDecrement
LCMapStringW
LCMapStringA
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
wsprintfW
GetAsyncKeyState
MessageBoxA
wsprintfA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
closesocket
gethostbyname
WSASocketA
htons
WSAStartup
WSACleanup
connect
EventLogon
EventStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ